Date: Mon, 15 Jan 2001 17:06:47 -0700
From: Caldera Support Info <[email protected]>
To: [email protected]Subject: Caldera Systems Security Advisory
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
Caldera Systems, Inc. Security Advisory
Subject: security problems in dhcp
Advisory number: CSSA-2001-003.0
Issue date: 2001 January, 12
Cross reference:
______________________________________________________________________________
1. Problem Description
The DHCP server and client shipped as part of OpenLinux
had security problems in the error logging code. An
attacker can potentially overflow a static buffer, and
provide a string containing formatting directives.
2. Vulnerable Versions
System Package
-----------------------------------------------------------
OpenLinux Desktop 2.3 All packages previous to
dhcpd-1.0pl2-4
OpenLinux eServer 2.3.1 All packages previous to
and OpenLinux eBuilder dhcp2-2.0-1
OpenLinux eDesktop 2.4 All packages previous to
dhcp-2.0b1pl29-2
3. Solution
Workaround:
none
The proper solution is to upgrade to the fixed packages
4. OpenLinux Desktop 2.3
4.1 Location of Fixed Packages
The upgrade packages can be found on Caldera's FTP site at:
ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/
The corresponding source code package can be found at:
ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/SRPMS
4.2 Verification
eca24327ed103c02a9799bf04a9a7094 RPMS/dhcpd-1.0pl2-4.i386.rpm
ba5d3067b4d4eca8a36d8a4c63f33ba2 SRPMS/dhcpd-1.0pl2-4.src.rpm
4.3 Installing Fixed Packages
Upgrade the affected packages with the following commands:
rpm -Fhv dhcpd-1.0pl2-4.i386.rpm
5. OpenLinux eServer 2.3.1 and OpenLinux eBuilder for ECential 3.0
5.1 Location of Fixed Packages
The upgrade packages can be found on Caldera's FTP site at:
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/
The corresponding source code package can be found at:
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/SRPMS
5.2 Verification
7d97d64396ab2ac7985cc2f0289850c9 RPMS/dhcp2-2.0-1.i386.rpm
c58d5fa028f934b5d28092cf18e04919 SRPMS/dhcp2-2.0-1.src.rpm
5.3 Installing Fixed Packages
Upgrade the affected packages with the following commands:
rpm -Fhv dhcp2-2.0-1.i386.rpm
6. OpenLinux eDesktop 2.4
6.1 Location of Fixed Packages
The upgrade packages can be found on Caldera's FTP site at:
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/
The corresponding source code package can be found at:
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/SRPMS
6.2 Verification
50c2533cc0d2baf90c81a253705dd985 RPMS/dhcp-2.0b1pl29-2.i386.rpm
963b467e66479761810219aaa63688cf SRPMS/dhcp-2.0b1pl29-2.src.rpm
6.3 Installing Fixed Packages
Upgrade the affected packages with the following commands:
rpm -Fhv dhcp-2.0b1pl29-2.i386.rpm
7. References
This and other Caldera security resources are located at:
http://www.calderasystems.com/support/security/index.html
This security fix closes Caldera's internal Problem Report 8668.
8. Disclaimer
Caldera Systems, Inc. is not responsible for the misuse of any of the
information we provide on this website and/or through our security
advisories. Our advisories are a service to our customers intended to
promote secure installation and use of Caldera OpenLinux.
9. Acknowledgements
Caldera Systems, Inc. wishes to thank the Team at Immunix, Greg KH
at Wirex and Gert Doering for their cooperation.
______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE6X3iT18sy83A/qfwRAp3tAKCOGIGs8AUqd6eoUL0stkj3PstfTQCgudVK
lo6+ze+QIunS8mayaYtPg6I=
=Yc/3
-----END PGP SIGNATURE-----