First published: Tue Jul 07 2009(Updated: )
The configtest function in the Red Hat dhcpd init script for DHCP 3.0.1 in Red Hat Enterprise Linux (RHEL) 3 allows local users to overwrite arbitrary files via a symlink attack on an unspecified temporary file, related to the "dhcpd -t" command.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =3.0 | |
ISC DHCP Client | =3.0.1-rc1 | |
ISC DHCP Client | =3.0.1-rc10 | |
ISC DHCP Client | =3.0.1-rc11 | |
ISC DHCP Client | =3.0.1-rc12 | |
ISC DHCP Client | =3.0.1-rc13 | |
ISC DHCP Client | =3.0.1-rc14 | |
ISC DHCP Client | =3.0.1-rc2 | |
ISC DHCP Client | =3.0.1-rc5 | |
ISC DHCP Client | =3.0.1-rc6 | |
ISC DHCP Client | =3.0.1-rc7 | |
ISC DHCP Client | =3.0.1-rc8 | |
ISC DHCP Client | =3.0.1-rc9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1893 is classified as a high-severity vulnerability due to the potential for local users to overwrite arbitrary files.
To fix CVE-2009-1893, users should apply the latest patches released by Red Hat for the affected versions of DHCP.
CVE-2009-1893 affects Red Hat Enterprise Linux 3.0 and ISC DHCP Server versions 3.0.1, including various release candidates.
CVE-2009-1893 is associated with a symlink attack that allows local users to manipulate temporary files.
No, CVE-2009-1893 can only be exploited locally by authenticated users with access to the system.