[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SA:2009:037 -- SUSE dhcp-client remote code execution

ID: oval:org.secpod.oval:def:400065Date: (C)2012-01-31   (M)2022-03-04
Class: PATCHFamily: unix




The DHCP client could be crashed by a malicious DHCP server sending an overlong subnet field CVE-2009-0692. In theory a malicious DHCP server could exploit the flaw to execute arbitrary code as root on machines using dhclient to obtain network settings. Newer distributions do have buffer overflow checking that guards against this kind of stack overflow though. So actual exploitability is rather unlikely.

Platform:
openSUSE 10.3
openSUSE 11.1
openSUSE 11.0
Product:
dhcp-client
Reference:
SUSE-SA:2009:037
CVE-2009-0692
CVE-2009-0642
CVE-2008-3905
CVE-2008-3790
CVE-2008-3656
CVE-2008-3443
CVE-2008-3655
CVE-2008-3657
CVE-2009-1904
CVE-2009-1886
CVE-2009-1888
CVE-2009-2042
CVE    12
CVE-2008-3443
CVE-2008-3655
CVE-2008-3790
CVE-2008-3656
...
CPE    3
cpe:/o:opensuse:opensuse:11.1
cpe:/o:opensuse:opensuse:11.0
cpe:/o:opensuse:opensuse:10.3

© SecPod Technologies