First published: Thu Jun 24 2004(Updated: )
The DHCP daemon (DHCPD) for ISC DHCP 3.0.1rc12 and 3.0.1rc13, when compiled in environments that do not provide the vsnprintf function, uses C include files that define vsnprintf to use the less safe vsprintf function, which can lead to buffer overflow vulnerabilities that enable a denial of service (server crash) and possibly execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Fedora Core | =core_2.0 | |
SUSE Linux | =9.0 | |
SUSE Linux | =8.2 | |
SUSE Linux | =8 | |
Mandrake Linux | =9.2 | |
SUSE Linux | =9.0 | |
SUSE Linux | =8.0 | |
Mandrake Linux | =9.2 | |
Mandrake Linux | =9.0 | |
SUSE Linux | =7 | |
SUSE Linux | =8.0 | |
SUSE Linux | =9.1 | |
Mandrake Linux | =9.1 | |
Mandrake Linux | =10.0 | |
Mandrake Linux | =9.1 | |
SUSE Linux | =8.1 | |
Mandrake Linux | =10.0 | |
Infoblox DNS One Appliance | =2.3.1_r5 | |
Infoblox DNS One Appliance | =2.4.0.8 | |
Infoblox DNS One Appliance | =2.4.0.8a | |
ISC DHCP Server | =3.0.1-rc12 | |
ISC DHCP Server | =3.0.1-rc13 | |
SUSE Email Server | =iii | |
SUSE SUSE Linux Firewall | ||
SUSE Linux Connectivity Server | ||
SUSE Linux Database Server | ||
SUSE SUSE Linux Firewall | ||
SUSE Office Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0461 is classified as a medium severity vulnerability due to the potential for a denial of service caused by buffer overflow.
To fix CVE-2004-0461, upgrade to a version of ISC DHCP that does not define vsnprintf to use the less safe vsprintf function.
CVE-2004-0461 affects ISC DHCP versions 3.0.1rc12 and 3.0.1rc13, along with specific versions of SUSE and Mandrake Linux.
CVE-2004-0461 enables a denial of service attack via buffer overflow vulnerabilities.
Yes, older versions of DHCPD, specifically 3.0.1rc12 and 3.0.1rc13, are vulnerable to CVE-2004-0461.