[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 321/04 - Mandrakelinux Security Update Advisory MDKSA-2004:061


- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 321/04 dated 22.06.04  Time: 14:45  
  UNIRAS is part of NISCC (National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------


Mandrakelinux Security Update Advisory MDKSA-2004:061:dhcp


A vulnerability in how ISC's DHCPD handles syslog messages can allow a  malicious
attacker with the ability to send special packets to the  DHCPD listening port to 
crash the daemon, causing a Denial of Service.


                 Mandrakelinux Security Update Advisory  

 Package name:           dhcp
 Advisory ID:            MDKSA-2004:061
 Date:                   June 22nd, 2004

 Affected versions:	 10.0, 9.2

 Problem Description:

A vulnerability in how ISC's DHCPD handles syslog messages can allow a  malicious 
attacker with the ability to send special packets to the  DHCPD listening port to 
crash the daemon, causing a Denial of Service.  It is also possible that they may
be able to execute arbitrary code on  the vulnerable server with the permission 
of the user running DHCPD,  which is usually root.
A similar vulnerability also exists in the way ISC's DHCPD makes use  of the
vsnprintf() function on system that do not support vsnprintf().  This vulnerability
could also be used to execute arbitrary code and/or  perform a DoS attack.  
The vsnprintf() statements that have this  problem are defined after the vulnerable
code noted above, which would  trigger the previous problem rather than this one.
Thanks to Gregory Duchemin and Solar Designer for discovering these  flaws.
 The updated packages contain 3.0.1rc14 which is not vulnerable to these problems.  
Only ISC DHCPD 3.0.1rc12 and 3.0.1rc13 are vulnerable to  these issues.  



 Updated Packages:
 Mandrakelinux 10.0:
 574eac52ddcacf16291f6576a8d88f6a  10.0/RPMS/dhcp-client-3.0-1.rc14.0.1.100mdk.i586.rpm
 daa97478495244b8c5d58702702dc0f1  10.0/RPMS/dhcp-common-3.0-1.rc14.0.1.100mdk.i586.rpm
 734a616781e92b6458a8417eb14161ca  10.0/RPMS/dhcp-devel-3.0-1.rc14.0.1.100mdk.i586.rpm
 430beae5883163e375d998c081faf7da  10.0/RPMS/dhcp-relay-3.0-1.rc14.0.1.100mdk.i586.rpm
 6bbe45c7d34fd77200af87e680083476  10.0/RPMS/dhcp-server-3.0-1.rc14.0.1.100mdk.i586.rpm
 0ba079c89ac39a926ad929eea0d039fc  10.0/SRPMS/dhcp-3.0-1.rc14.0.1.100mdk.src.rpm

 Mandrakelinux 10.0/AMD64:
 cd75604fcba80ce0bf21951a3ba73ff3  amd64/10.0/RPMS/dhcp-client-3.0-1.rc14.0.1.100mdk.amd64.rpm
 68183a2721f0265deee61e518f2452c6  amd64/10.0/RPMS/dhcp-common-3.0-1.rc14.0.1.100mdk.amd64.rpm
 47a4ea90cae82e3de6e3a27d92cef456  amd64/10.0/RPMS/dhcp-devel-3.0-1.rc14.0.1.100mdk.amd64.rpm
 a3f9fc9203b91344471fb12cba5e6011  amd64/10.0/RPMS/dhcp-relay-3.0-1.rc14.0.1.100mdk.amd64.rpm
 61a6a5e36b700bf1281c0009f85ed163  amd64/10.0/RPMS/dhcp-server-3.0-1.rc14.0.1.100mdk.amd64.rpm
 0ba079c89ac39a926ad929eea0d039fc  amd64/10.0/SRPMS/dhcp-3.0-1.rc14.0.1.100mdk.src.rpm

 Mandrakelinux 9.2:
 a612a277ca12c0849143d22dad13b975  9.2/RPMS/dhcp-client-3.0-1.rc14.0.1.92mdk.i586.rpm
 ed71711e48503ea62da6b5b15d3cf0d5  9.2/RPMS/dhcp-common-3.0-1.rc14.0.1.92mdk.i586.rpm
 bdc249338103e5a811b25f366f85d379  9.2/RPMS/dhcp-devel-3.0-1.rc14.0.1.92mdk.i586.rpm
 78b5b964a6f3e71903c97d933136d8e0  9.2/RPMS/dhcp-relay-3.0-1.rc14.0.1.92mdk.i586.rpm
 50433f11a2d1ee06fc4e8bd2a53d0952  9.2/RPMS/dhcp-server-3.0-1.rc14.0.1.92mdk.i586.rpm
 4372c59939884d2f4717028f8751c123  9.2/SRPMS/dhcp-3.0-1.rc14.0.1.92mdk.src.rpm

 Mandrakelinux 9.2/AMD64:
 7d8a75f6e07ca949fcd0ae1b839829d6  amd64/9.2/RPMS/dhcp-client-3.0-1.rc14.0.1.92mdk.amd64.rpm
 d1cf956a03cb711385038ade1fe96eb4  amd64/9.2/RPMS/dhcp-common-3.0-1.rc14.0.1.92mdk.amd64.rpm
 8855a669ada369c6a543ae30de40afb6  amd64/9.2/RPMS/dhcp-devel-3.0-1.rc14.0.1.92mdk.amd64.rpm
 ef663e3fcd1cc9e3bf4132265bbcbb3d  amd64/9.2/RPMS/dhcp-relay-3.0-1.rc14.0.1.92mdk.amd64.rpm
 df53ebb708b9ccf08c499be5d20e8eeb  amd64/9.2/RPMS/dhcp-server-3.0-1.rc14.0.1.92mdk.amd64.rpm
 4372c59939884d2f4717028f8751c123  amd64/9.2/SRPMS/dhcp-3.0-1.rc14.0.1.92mdk.src.rpm

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification  of md5 checksums and GPG 
signatures is performed automatically for you.

 All packages are signed by Mandrakesoft for security.  You can obtain  the GPG public key of 
the Mandrakelinux Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandrakelinux at:


 If you want to report vulnerabilities, please contact


 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>
Version: GnuPG v1.0.7 (GNU/Linux)


- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via 
EMail to: uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 20 7821 1330 Ext 4511
Fax: +44 (0) 20 7821 1686

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 20 7821 1330 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Mandrake for the information 
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>

Version: PGP 8.0