|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2003:0006: dhcp Vulnerability Assessment Details
|
SUSE-SA:2003:0006: dhcp |
||
Check for the version of the dhcp package Detailed Explanation for this Vulnerability Assessment The remote host is missing the patch for the advisory SUSE-SA:2003:0006 (dhcp). The ISC (Internet Software Consortium) dhcp package is an imple- mentation of the 'Dynamic Host Configuration Protocol' (DHCP). An internal source code audit done by ISC revealed several buffer overflows in the code which is responsible to handle dynamic DNS requests. These bugs permit a possible hacker to gain remote access to the dhcp server if the dynamic DNS feature is enabled. Dynamic DNS is not enabled by default on SUSE LINUX. As temporary fix you can disable dynamic DNS support and restart your dhcp server. Otherwise install the new packages from our FTP servers. Please backup your lease file before updating the package. After the package update you have to restart the dhcp server This can be done by executing the following commands as root: - rcdhcpd restart or (for older versions): - rcdhcp restart Please download the update package for your distribution and verify its integrity by the methods listed in section 3) of this announcement. Then, install the package using the command 'rpm -Fhv file.rpm' to apply the update. Solution : http://www.suse.de/security/2003_006_dhcp.html Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security |
||
Cables, Connectors |
Netac 1TB 2TB 512GB Internal SSD 2.5'' SATA III 6Gb/s Solid State Drive lot
$115.99
Fanxiang 1TB M.2 SSD 2280 NVMe PCIe 2TB Internal Solid State Drive 7300MB/s LOT
$225.95
Fanxiang M.2 SATA SSD 2TB 1TB 512GB 256GB SSD Internal M2 Solid State Drive Lot
$109.99
4TB Ssd Internal Solid State Drive Hard Disk 2.5 Inch For Laptop SSD
$61.74
Patriot P210 128GB 256GB 512GB 1TB 2TB 2.5" SATA 3 6GB/s Internal SSD PC/MAC Lot
$16.99
Netac 128GB SSD 2.5'' SATA III 6 Gb/s Internal Solid State Drive 500MB/s PC/MAC
$12.49
SAMSUNG 870 EVO 500GB 2.5" SSD SATA HARD DRIVE (MZ-77E500)
$29.98
1TB HDD/SSD 2.5" SATA Hard Drive with Windows 10 or Windows 11 Installed
$14.55
M.2 NVMe SSD 128GB 256GB 512GB Single Notch with Windows Installed 10 / 11
$81.27
Fanxiang 4TB 2TB 1TB SSD 2.5'' SATA III 560MB/s Internal Solid State Drive lot
$195.99
|
||
No Discussions have been posted on this vulnerability. |