Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2003:007: dhcp


Vulnerability Assessment Details

MDKSA-2003:007: dhcp

Vulnerability Assessment Summary
Check for the version of the dhcp package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2003:007 (dhcp).


Several potential vulnerabilities were detected by the ISC (Internet Software
Consortium) in their dhcp server software. The vulnerabilities affect the
minires library and may be exploitable as stack buffer overflows, which could
lead to remote code execution. All Mandrake Linux users are encouraged to
upgrade
only Mandrake Linux 8.0 came with dhcp 2.x and is not vulnerable.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2003:007
Network Security Threat Level: High

Networks Security ID: 6627

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Arris TM822G Docsis 3.0 Cable VoIP Telephony Modem Optimum
$85.99
Arris TM822G Docsis 3.0 Cable VoIP Telephony Modem Optimum  pictureGrandstream Networks HandyTone 503 FXS FXO VoIP Adapter
$132.13
Grandstream Networks HandyTone 503 FXS FXO VoIP Adapter picturePrepaid Calling Card system VOIP UTELUS h323-SIP Softswitch Hosting 100 Port
$200.0
Prepaid Calling Card system VOIP UTELUS h323-SIP Softswitch Hosting 100 Port pictureCisco CP-7937G 7937 - Unified IP Conference Station PoE VOIP Phone Telephone
$94.96
Cisco CP-7937G 7937 - Unified IP Conference Station PoE VOIP Phone Telephone picture


Discussions

No Discussions have been posted on this vulnerability.