The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[CLA-2003:562] Conectiva Linux Security Announcement - dhcp


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Thu, 23 Jan 2003 16:55:30 -0200
From: secure@conectiva.com.br
To: conectiva-updates@papaleguas.conectiva.com.br, lwn@lwn.net,
Subject: [CLA-2003:562] Conectiva Linux Security Announcement - dhcp

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
CONECTIVA LINUX SECURITY ANNOUNCEMENT 
- --------------------------------------------------------------------------

PACKAGE   : dhcp
SUMMARY   : Remote Vulnerability
DATE      : 2003-01-23 16:54:00
ID        : CLA-2003:562
RELEVANT
RELEASES  : 8

- -------------------------------------------------------------------------

DESCRIPTION
 The package "dhcp" provides a Dynamic Host Configuration Protocol[1]
 server developed by ISC (ISC DHCPD).
 
 During an internal source code audit, the ISC developers found
 several stack-based buffer overflow vulnerabilities[2,3] in the error
 handling routines of the minires library. This library is used by the
 NSUPDATE feature, which is present in dhcp versions newer than 3.0
 and allows the DHCP server to dynamically update DNS server records.
 
 A remote attacker which can send messages directly to the DHCP server
 can exploit these vulnerabilities to execute arbitrary code in the
 server context with the privileges of the root user.
 
 The packages provided with this announcement fix these
 vulnerabilities with a patch from ISC. Please note that Conectiva
 Linux versions prior to 8 do not ship dhcp 3.0 and therefore are not
 vulnerable to this problem.


SOLUTION
 All dhcp users should upgrade immediately. After upgrading the
 packages, please restart the dhcpd service if it is already running.
 This can be done with the command below (as the root user):
 
 # service dhcpd restart
 
 
 REFERENCES:
 1.http://www.ietf.org/rfc/rfc2131.txt
 2.http://www.cert.org/advisories/CA-2003-01.html
 3.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0026
 4.http://www.isc.org/products/DHCP/


UPDATED PACKAGES
ftp://atualizacoes.conectiva.com.br/8/RPMS/dhcp-3.0-3U80_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/dhcp-doc-3.0-3U80_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/SRPMS/dhcp-3.0-3U80_2cl.src.rpm


ADDITIONAL INSTRUCTIONS
 Users of Conectiva Linux version 6.0 or higher may use apt to perform 
 upgrades of RPM packages:

 - run:                 apt-get update
 - after that, execute: apt-get upgrade

 Detailed instructions reagarding the use of apt and upgrade examples 
 can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en


- -------------------------------------------------------------------------
All packages are signed with Conectiva's GPG key. The key and instructions
on how to import it can be found at 
http://distro.conectiva.com.br/seguranca/chave/?idioma=en
Instructions on how to check the signatures of the RPM packages can be
found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en
- -------------------------------------------------------------------------
All our advisories and generic update instructions can be viewed at
http://distro.conectiva.com.br/atualizacoes/?idioma=en

- -------------------------------------------------------------------------
subscribe: conectiva-updates-subscribe@papaleguas.conectiva.com.br
unsubscribe: conectiva-updates-unsubscribe@papaleguas.conectiva.com.br
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE+MDqh42jd0JmAcZARAnREAKCn5FLQpS/K2LCN7CKpLp5YicskFwCgqEjb
3vyJFdM/LVHPcYwDHDmhIRk=
=k1BM
-----END PGP SIGNATURE-----

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру