First published: Tue Jun 23 2009(Updated: )
Stack-based buffer overflow in the script_write_params method in client/dhclient.c in ISC DHCP dhclient 4.1 before 4.1.0p1, 4.0 before 4.0.1p1, 3.1 before 3.1.2p1, 3.0, and 2.0 allows remote DHCP servers to execute arbitrary code via a crafted subnet-mask option.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/dhcp | <7:3.0.1-65.el4_8.1 | 7:3.0.1-65.el4_8.1 |
redhat/dhcp | <7:3.0.1-62.el4_7.1 | 7:3.0.1-62.el4_7.1 |
ISC DHCP Server | =4.1.0 | |
ISC DHCP Server | =2.0 | |
ISC DHCP Server | =3.0 | |
ISC DHCP Server | =3.1 | |
ISC DHCP Server | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0692 has a high severity level due to its potential for remote code execution.
You can mitigate CVE-2009-0692 by upgrading to the patched versions of the ISC DHCP server as specified by your distribution.
CVE-2009-0692 affects ISC DHCP versions before 4.1.0p1, as well as older versions including 4.0, 3.1, 3.0, and 2.0.
Yes, CVE-2009-0692 can be exploited by a remote attacker through a crafted subnet-mask option sent by a malicious DHCP server.
CVE-2009-0692 affects systems running affected versions of the ISC DHCP client and server software.