First published: Tue Jul 23 2002(Updated: )
Format string vulnerabilities in the logging routines for dynamic DNS code (print.c) of ISC DHCP daemon (DHCPD) 3 to 3.0.1rc8, with the NSUPDATE option enabled, allow remote malicious DNS servers to execute arbitrary code via format strings in a DNS server response.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ISC DHCPD | =3.0.1-rc4 | |
ISC DHCPD | =3.0.1-rc5 | |
ISC DHCPD | =3.0.1-rc1 | |
ISC DHCPD | =3.0 | |
ISC DHCPD | =3.0.1-rc8 | |
ISC DHCPD | =3.0.1-rc3 | |
ISC DHCPD | =3.0.1-rc6 | |
ISC DHCPD | =3.0.1-rc2 | |
ISC DHCPD | =3.0.1-rc7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.