Date: Thu, 23 Jan 2003 16:55:30 -0200
From: [email protected]
To: [email protected], [email protected],
Subject: [CLA-2003:562] Conectiva Linux Security Announcement - dhcp
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- --------------------------------------------------------------------------
PACKAGE : dhcp
SUMMARY : Remote Vulnerability
DATE : 2003-01-23 16:54:00
ID : CLA-2003:562
RELEVANT
RELEASES : 8
- -------------------------------------------------------------------------
DESCRIPTION
The package "dhcp" provides a Dynamic Host Configuration Protocol[1]
server developed by ISC (ISC DHCPD).
During an internal source code audit, the ISC developers found
several stack-based buffer overflow vulnerabilities[2,3] in the error
handling routines of the minires library. This library is used by the
NSUPDATE feature, which is present in dhcp versions newer than 3.0
and allows the DHCP server to dynamically update DNS server records.
A remote attacker which can send messages directly to the DHCP server
can exploit these vulnerabilities to execute arbitrary code in the
server context with the privileges of the root user.
The packages provided with this announcement fix these
vulnerabilities with a patch from ISC. Please note that Conectiva
Linux versions prior to 8 do not ship dhcp 3.0 and therefore are not
vulnerable to this problem.
SOLUTION
All dhcp users should upgrade immediately. After upgrading the
packages, please restart the dhcpd service if it is already running.
This can be done with the command below (as the root user):
# service dhcpd restart
REFERENCES:
1.http://www.ietf.org/rfc/rfc2131.txt
2.http://www.cert.org/advisories/CA-2003-01.html
3.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0026
4.http://www.isc.org/products/DHCP/
UPDATED PACKAGES
ftp://atualizacoes.conectiva.com.br/8/RPMS/dhcp-3.0-3U80_2cl.i386.rpmftp://atualizacoes.conectiva.com.br/8/RPMS/dhcp-doc-3.0-3U80_2cl.i386.rpmftp://atualizacoes.conectiva.com.br/8/SRPMS/dhcp-3.0-3U80_2cl.src.rpm
ADDITIONAL INSTRUCTIONS
Users of Conectiva Linux version 6.0 or higher may use apt to perform
upgrades of RPM packages:
- run: apt-get update
- after that, execute: apt-get upgrade
Detailed instructions reagarding the use of apt and upgrade examples
can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en
- -------------------------------------------------------------------------
All packages are signed with Conectiva's GPG key. The key and instructions
on how to import it can be found at
http://distro.conectiva.com.br/seguranca/chave/?idioma=en
Instructions on how to check the signatures of the RPM packages can be
found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en
- -------------------------------------------------------------------------
All our advisories and generic update instructions can be viewed at
http://distro.conectiva.com.br/atualizacoes/?idioma=en
- -------------------------------------------------------------------------
subscribe: [email protected]
unsubscribe: [email protected]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE+MDqh42jd0JmAcZARAnREAKCn5FLQpS/K2LCN7CKpLp5YicskFwCgqEjb
3vyJFdM/LVHPcYwDHDmhIRk=
=k1BM
-----END PGP SIGNATURE-----