Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in dhcp
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in dhcp
ID: MDVSA-2012:116
Distribution: Mandriva
Plattformen: Mandriva Enterprise Server 5.0
Datum: Fr, 27. Juli 2012, 07:56
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3571
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3954
Applikationen: ISC DHCP

Originalnachricht

This is a multi-part message in MIME format...

------------=_1343323810-2945-190

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2012:116
http://www.mandriva.com/security/
_______________________________________________________________________

Package : dhcp
Date : July 26, 2012
Affected: Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Multiple vulnerabilities has been discovered and corrected in ISC DHCP:

An error in the handling of malformed client identifiers can cause
a DHCP server running affected versions (see Impact) to enter a
state where further client requests are not processed and the server
process loops endlessly, consuming all available CPU cycles. Under
normal circumstances this condition should not be triggered, but a
non-conforming or malicious client could deliberately trigger it in
a vulnerable server. In order to exploit this condition an attacker
must be able to send requests to the DHCP server (CVE-2012-3571).

Two memory leaks have been found and fixed in ISC DHCP. Both are
reproducible when running in DHCPv6 mode (with the -6 command-line
argument.) The first leak is confirmed to only affect servers
operating in DHCPv6 mode, but based on initial code analysis the
second may theoretically affect DHCPv4 servers (though this has not
been demonstrated.) (CVE-2012-3954).

The updated packages have been patched to correct these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3571
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3954
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
98ba7b30258cfd06bc7a19bd4757a183
mes5/i586/dhcp-client-4.1.2-0.7mdvmes5.2.i586.rpm
331d5e2d556f3877f16173d13ec68b5f
mes5/i586/dhcp-common-4.1.2-0.7mdvmes5.2.i586.rpm
1af957f584ba970e1842df8b292b9474
mes5/i586/dhcp-devel-4.1.2-0.7mdvmes5.2.i586.rpm
e6ee64358b5c5bca19e16e523a071711
mes5/i586/dhcp-doc-4.1.2-0.7mdvmes5.2.i586.rpm
39fb25199a18755c702a3e746b3bb8f4
mes5/i586/dhcp-relay-4.1.2-0.7mdvmes5.2.i586.rpm
f1da21f64e8867506447422ffd871195
mes5/i586/dhcp-server-4.1.2-0.7mdvmes5.2.i586.rpm
b1615f9c33a0cbb3e6e7e1e7ef04ee07 mes5/SRPMS/dhcp-4.1.2-0.7mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
fb2e6ba527910d8ef4dd1f7a48f30356
mes5/x86_64/dhcp-client-4.1.2-0.7mdvmes5.2.x86_64.rpm
cf5be061e3c8870e70a54df491a7b329
mes5/x86_64/dhcp-common-4.1.2-0.7mdvmes5.2.x86_64.rpm
3f20bd4ffd8855696f76876994c286d8
mes5/x86_64/dhcp-devel-4.1.2-0.7mdvmes5.2.x86_64.rpm
c4fa73d255e097277d501e2fd008c145
mes5/x86_64/dhcp-doc-4.1.2-0.7mdvmes5.2.x86_64.rpm
ddb661502b75f6e6b454e369719961f1
mes5/x86_64/dhcp-relay-4.1.2-0.7mdvmes5.2.x86_64.rpm
89911babd5524527358b41a787136450
mes5/x86_64/dhcp-server-4.1.2-0.7mdvmes5.2.x86_64.rpm
b1615f9c33a0cbb3e6e7e1e7ef04ee07 mes5/SRPMS/dhcp-4.1.2-0.7mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFQEVJymqjQ0CJFipgRAgZ/AJoDUR3yQZ+z5pywvEKKb3ZhsdnlwwCgjF1V
8RcyXB2jyJfp5uHmWRMZZPU=
=jLLd
-----END PGP SIGNATURE-----


------------=_1343323810-2945-190
Content-Type: text/plain; charset="UTF-8";
name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1343323810-2945-190--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung