TUCoPS :: BSD :: iscdhcp3.htm

OpenBSD ISC DHCP Format string bugs (also affects Linux)
Vulnerability

    SC-dhcpd, ucd-snmp

Affected

    iscdhcp

Description

    Chris  Evans   found  following.    More   format  string    bugs.
    Exploitability on these has  not really been researched.   Current
    feeling is "maybe  exploitable under certain  circumstances or/and
    configurations".

    An in-depth discussion is not required.  Here are the locations of
    the code flaws:

        [root@localhost dhcp-2.0]# pwd
        /usr/src/redhat/BUILD/dhcp-2.0
        [root@localhost dhcp-2.0]# find . -name \*.c | xargs grep syslog |less
        ./client/dhclient.c:    /* Initially, log errors to stderr as well as to syslogd. */
        ./common/errwarn.c:  syslog (log_priority | LOG_ERR, mbuf);
        ./common/errwarn.c:  syslog (LOG_CRIT, "exiting.");
        ./common/errwarn.c:  syslog (log_priority | LOG_ERR, mbuf);
        ./common/errwarn.c:  syslog (log_priority | LOG_INFO, mbuf);
        ./common/errwarn.c:  syslog (log_priority | LOG_DEBUG, mbuf);
        ./common/errwarn.c:     syslog (log_priority | LOG_ERR, mbuf);
        ./common/errwarn.c:     syslog (log_priority | LOG_ERR, token_line);
        ./common/errwarn.c:             syslog (log_priority | LOG_ERR,
        ./relay/dhcrelay.c:     /* Initially, log errors to stderr as well as to syslogd. */
        ./server/dhcpd.c:       /* Initially, log errors to stderr as well as to syslogd. */
        [root@localhost dhcp-2.0]#

        ---
        ucd-snmp-4.1.2/snmplib/snmp_logging.c
        snmp_log_string()
        ~line 183

        ...
          if (do_syslogging) {
            syslog(priority, string);
          }
        ...
        ---

Solution

    It's  an  "alertness"  thing,  not  an  exploitability thing.  The
    presence of  these format  string bugs  shows a  lack of  security
    alertness, regardless of whether  or not these specific  instances
    are exploitable.  Very few people seem to be responding adequately
    to the format strings threat. OpenBSD is one of exceptions.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH