Mandrake Linux Advisory: dhcp (update for Single Network Firewall 7.2)

25
Mandrake: “Fermin J. Serna discovered a problem in the dhcp server and client
package from versions 3.0 to 3.0.1rc8, which are affected by a format
string vulnerability that can be exploited remotely.”


______________________________________________________________________

                Mandrake Linux Security Update Advisory
______________________________________________________________________

Package name:           dhcp
Advisory ID:            MDKSA-2002:037-1
Date:                   May 30th, 2002
Original Advisory Date: May 29th, 2002
Affected versions:      Single Network Firewall 7.2
______________________________________________________________________

Problem Description:

 Fermin J. Serna discovered a problem in the dhcp server and client
 package from versions 3.0 to 3.0.1rc8, which are affected by a format
 string vulnerability that can be exploited remotely.  By default, these
 versions of DHCP are compiled with the dns update feature enabled,
 which allows DHCP to update DNS records.  The code that logs this
 update has an exploitable format string vulnerability; the update 
 message can contain data provided by the attacker, such as a hostname.
 A successful exploitation could give the attacker elevated privileges
 equivalent to the user running the DHCP daemon, which is the user dhcpd
 in Mandrake Linux 8.x, but root in earlier versions.

Update:

 The packages previously provided for SNF7.2 were the incorrect version.
 These new packages provide the proper version of dhcpd for SNF7.2.
______________________________________________________________________

References:

 http://www.cert.org/advisories/CA-2002-12.htmlhttp://www.ngsec.com/docs/advisories/NGSEC-2002-2.txt
______________________________________________________________________

Updated Packages:

 Single Network Firewall 7.2:
 381344516b790101c2eee850879cb5aa  snf7.2/RPMS/dhcp-3.0b2pl23-2.1mdk.i586.rpm
 84e4567de46573b577b235079ce31e97  snf7.2/RPMS/dhcp-client-3.0b2pl23-2.1mdk.i586.rpm
 2616a1003b248b0f27b7fb70abca57cf  snf7.2/RPMS/dhcp-relay-3.0b2pl23-2.1mdk.i586.rpm
 5865549fc6715b730ddff90194c15b96  snf7.2/SRPMS/dhcp-3.0b2pl23-2.1mdk.src.rpm
______________________________________________________________________

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):

______________________________________________________________________

To upgrade automatically, use MandrakeUpdate.  The verification of md5
checksums and GPG signatures is performed automatically for you.

If you want to upgrade manually, download the updated package from one 
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm".  A list of
FTP mirrors can be obtained from:

  http://www.mandrakesecure.net/en/ftp.php

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package.  You can do this with the command:

  rpm --checksig <filename>

All packages are signed by MandrakeSoft for security.  You can obtain
the GPG public key of the Mandrake Linux Security Team from:

  https://www.mandrakesecure.net/RPM-GPG-KEYS

Please be aware that sometimes it takes the mirrors a few hours to 
update.

You can view other update advisories for Mandrake Linux at:

  http://www.mandrakesecure.net/en/advisories/

MandrakeSoft has several security-related mailing list services that
anyone can subscribe to.  Information on these lists can be obtained by
visiting:

  http://www.mandrakesecure.net/en/mlist.php

If you want to report vulnerabilities, please contact

  security@linux-mandrake.com
______________________________________________________________________

Type Bits/KeyID     Date       User ID
pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security@linux-mandrake.com>

Category:

  • Security