First published: Tue Jul 23 2002(Updated: )
Format string vulnerabilities in the logging routines for dynamic DNS code (print.c) of ISC DHCP daemon (DHCPD) 3 to 3.0.1rc8, with the NSUPDATE option enabled, allow remote malicious DNS servers to execute arbitrary code via format strings in a DNS server response.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ISC DHCP | =3.0.1-rc4 | |
ISC DHCP | =3.0.1-rc5 | |
ISC DHCP | =3.0.1-rc1 | |
ISC DHCP | =3.0 | |
ISC DHCP | =3.0.1-rc8 | |
ISC DHCP | =3.0.1-rc3 | |
ISC DHCP | =3.0.1-rc6 | |
ISC DHCP | =3.0.1-rc2 | |
ISC DHCP | =3.0.1-rc7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0702 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2002-0702, upgrade to a non-vulnerable version of ISC DHCP Daemon that has addressed the format string vulnerabilities.
CVE-2002-0702 affects ISC DHCP daemon versions 3 to 3.0.1rc8 with the NSUPDATE option enabled.
CVE-2002-0702 allows remote attackers to execute arbitrary code on the affected system through manipulated DNS server responses.
While CVE-2002-0702 primarily impacts older versions of ISC DHCP, systems running these versions remain at risk if not updated.