Home > Security > Advisories


Mandriva Advisories

Package name dhcp
Date May 30th, 2002
Advisory ID MDKSA-2002:037-1
Affected versions
Synopsis Updated dhcp packages fix format string vulnerability

Problem Description

Fermin J. Serna discovered a problem in the dhcp server and client
package from versions 3.0 to 3.0.1rc8, which are affected by a format
string vulnerability that can be exploited remotely. By default, these
versions of DHCP are compiled with the dns update feature enabled,
which allows DHCP to update DNS records. The code that logs this
update has an exploitable format string vulnerability; the update
message can contain data provided by the attacker, such as a hostname.
A successful exploitation could give the attacker elevated privileges
equivalent to the user running the DHCP daemon, which is the user dhcpd
in Mandrake Linux 8.x, but root in earlier versions.


The packages previously provided for SNF7.2 were the incorrect version.
These new packages provide the proper version of dhcpd for SNF7.2.

Updated Packages




To upgrade automatically, use MandrivaUpdate.


Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.