Nom du paquet
Advisory ID
Affected versions
SNF7.2 i586

Problem description

Fermin J. Serna discovered a problem in the dhcp server and client package from versions 3.0 to 3.0.1rc8, which are affected by a format string vulnerability that can be exploited remotely. By default, these versions of DHCP are compiled with the dns update feature enabled, which allows DHCP to update DNS records. The code that logs this update has an exploitable format string vulnerability; the update message can contain data provided by the attacker, such as a hostname. A successful exploitation could give the attacker elevated privileges equivalent to the user running the DHCP daemon, which is the user dhcpd in Mandrake Linux 8.x, but root in earlier versions. Update: The packages previously provided for SNF7.2 were the incorrect version. These new packages provide the proper version of dhcpd for SNF7.2.

Updated packages

SNF7.2 i586

 381344516b790101c2eee850879cb5aa  snf7.2/RPMS/dhcp-3.0b2pl23-2.1mdk.i586.rpm
84e4567de46573b577b235079ce31e97  snf7.2/RPMS/dhcp-client-3.0b2pl23-2.1mdk.i586.rpm
2616a1003b248b0f27b7fb70abca57cf  snf7.2/RPMS/dhcp-relay-3.0b2pl23-2.1mdk.i586.rpm
5865549fc6715b730ddff90194c15b96  snf7.2/SRPMS/dhcp-3.0b2pl23-2.1mdk.src.rpm