First published: Thu Jun 24 2004(Updated: )
Buffer overflow in the logging capability for the DHCP daemon (DHCPD) for ISC DHCP 3.0.1rc12 and 3.0.1rc13 allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via multiple hostname options in (1) DISCOVER, (2) OFFER, (3) REQUEST, (4) ACK, or (5) NAK messages, which can generate a long string when writing to a log file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Fedora Core | =core_2.0 | |
SUSE Linux | =9.0 | |
SUSE Linux | =8.2 | |
SUSE Linux | =8 | |
Mandrake Linux | =9.2 | |
SUSE Linux | =9.0 | |
SUSE Linux | =8.0 | |
Mandrake Linux | =9.2 | |
Mandrake Linux | =9.0 | |
SUSE Linux | =7 | |
SUSE Linux | =8.0 | |
SUSE Linux | =9.1 | |
Mandrake Linux | =9.1 | |
Mandrake Linux | =10.0 | |
Mandrake Linux | =9.1 | |
SUSE Linux | =8.1 | |
Mandrake Linux | =10.0 | |
Infoblox DNS One Appliance | =2.3.1_r5 | |
Infoblox DNS One Appliance | =2.4.0.8 | |
Infoblox DNS One Appliance | =2.4.0.8a | |
ISC DHCP | =3.0.1-rc12 | |
ISC DHCP | =3.0.1-rc13 | |
Emailarchitect Email Server | =iii | |
SUSE SUSE Linux Firewall | ||
SUSE Linux Connectivity Server | ||
SUSE Linux Database Server | ||
SUSE SUSE Linux Firewall | ||
SUSE Office Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2004-0460 is high due to the potential for remote code execution and denial of service.
To fix CVE-2004-0460, upgrade to a patched version of ISC DHCP, specifically versions after 3.0.1rc13.
CVE-2004-0460 affects ISC DHCP versions 3.0.1rc12 and 3.0.1rc13, as well as various Linux distributions that incorporate these versions.
Attackers can exploit CVE-2004-0460 to cause a denial of service or potentially execute arbitrary code on the affected DHCP server.
While CVE-2004-0460 is an older vulnerability, it remains relevant for legacy systems that have not been updated or patched.