Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA584] DSA-584-1 dhcp


Vulnerability Assessment Details

[DSA584] DSA-584-1 dhcp

Vulnerability Assessment Summary
DSA-584-1 dhcp

Detailed Explanation for this Vulnerability Assessment

"infamous41md" noticed that the log functions in dhcp 2.x, which is
still distributed in the stable Debian release, contained pass
parameters to function that use format strings. One use seems to be
exploitable in connection with a malicious DNS server.
For the stable distribution (woody) these problems have been fixed in
version 2.0pl5-11woody1.
For the unstable distribution (sid) these problems have been fixed in
version 2.0pl5-19.1.
We recommend that you upgrade your dhcp package.


Solution : http://www.debian.org/security/2004/dsa-584
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

DELL OPTIPLEX 3010 CORE i5-3470 QUAD-CORE 3.2GHz 8GB 500GB HDMI DVD WIN 7 PRO PC
$130.0
DELL OPTIPLEX 3010 CORE i5-3470 QUAD-CORE 3.2GHz 8GB 500GB HDMI DVD WIN 7 PRO PC pictureApple MacBook Air 13.3" MD760LL/A Core i7 1.7Ghz 8Gb 256Gb Office FinalCut 2013
$599.98
Apple MacBook Air 13.3Microsoft Surface Pro (Intel Core i7, 8GB RAM, 256GB) NEW 2017 Model 1796
$1425.0
Microsoft Surface Pro (Intel Core i7, 8GB RAM, 256GB) NEW 2017 Model 1796 pictureRazer Gaming PC Quad Core i7 7700 8GB 1TB GTX 1080 8GB Custom Computer Desktop
$1475.0
Razer Gaming PC Quad Core i7 7700 8GB 1TB GTX 1080 8GB Custom Computer Desktop picture


Discussions

No Discussions have been posted on this vulnerability.