10th May 2002 [SBWID-5337]
COMMAND
ISC DHCPDv3 remote root compromise
SYSTEMS AFFECTED
ISC DHCPD version 3.0.1rc8 and older
PROBLEM
In Fermín J. Serna [fjserna@ngsec.com] of NGSEC [http://www.ngsec.com]
advisory [NGSEC-2002-2] :
ISC DHCPD (in its verion 3) is compiled by default with NSUPDATE. If
ISC DHCPD is configured to make a dns-update when a dhcp request
arrives, it will send a dns-update request to the configured DNS
server. When the DNS server sends the response the ISC DHCPD parses the
packet and logs the result of the dns-update request in the following
way:
if (errorp)
log_error (obuf);
else
log_info (obuf);
This code lacks of format string. Since \"obuf\" contains some user
supplied data such as client hostname, an attacker can query the ISC
DHCP server with a hostname field containing a malign format string
(%n).
This vulnerability can be exploited on local lans, lans with DHCP relay
servers or acting as a fake DHCP relay server.
SOLUTION
You can upgrade to a newer version or apply the following patch:
- --- common/print.c Tue Apr 9 13:41:17 2002
+++ common/print.c.patched Tue Apr 9 13:41:56 2002
@@ -1366,8 +1366,8 @@
*s++ = \'.\';
*s++ = 0;
if (errorp)
- - log_error (obuf);
+ log_error (\"%s\",obuf);
else
- - log_info (obuf);
+ log_info (\"%s\",obuf);
}
#endif /* NSUPDATE */
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH