First published: Thu Jan 16 2003(Updated: )
Multiple stack-based buffer overflows in the error handling routines of the minires library, as used in the NSUPDATE capability for ISC DHCPD 3.0 through 3.0.1RC10, allow remote attackers to execute arbitrary code via a DHCP message containing a long hostname.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ISC DHCP Server | =3.0.1-rc4 | |
ISC DHCP Server | =3.0.1-rc5 | |
ISC DHCP Server | =3.0.1-rc1 | |
ISC DHCP Server | =3.0 | |
ISC DHCP Server | =3.0.1-rc8 | |
ISC DHCP Server | =3.0.1-rc3 | |
ISC DHCP Server | =3.0.1-rc6 | |
ISC DHCP Server | =3.0.1-rc2 | |
ISC DHCP Server | =3.0.1-rc7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0026 is classified as a critical vulnerability due to the potential for remote code execution.
CVE-2003-0026 allows remote attackers to exploit stack-based buffer overflows via malicious DHCP messages.
To fix CVE-2003-0026, it is essential to upgrade to a patched version of ISC DHCPD that addresses this vulnerability.
CVE-2003-0026 affects ISC DHCPD versions 3.0 through 3.0.1RC10.
Exploiting CVE-2003-0026 could allow attackers to execute arbitrary code on the affected system.