blob: b6b7c43bfea42a6742e2c18adcf19dc467d68b24 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200507-16">
<title>dhcpcd: Denial of Service vulnerability</title>
A vulnerability in dhcpcd may cause the dhcpcd daemon to crash.
<product type="ebuild">dhcpcd</product>
<announced>July 15, 2005</announced>
<revised>July 15, 2005: 01</revised>
<package name="net-misc/dhcpcd" auto="yes" arch="*">
<unaffected range="ge">1.3.22_p4-r11</unaffected>
<vulnerable range="lt">1.3.22_p4-r11</vulnerable>
dhcpcd is a standards compliant DHCP client daemon. It requests an
IP address and other information from the DHCP server, automatically
configures the network interface, and tries to renew the lease time.
infamous42md discovered that dhcpcd can be tricked to read past
the end of the supplied DHCP buffer. As a result, this might lead to a
crash of the daemon.
<impact type="normal">
With a malicious DHCP server an attacker could cause a Denial of
Service by crashing the DHCP client.
There is no known workaround at this time.
All dhcpcd users should upgrade to the latest available version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-misc/dhcpcd-1.3.22_p4-r11&quot;</code>
<uri link="">CAN-2005-1848</uri>
<metadata tag="requester" timestamp="Mon, 11 Jul 2005 14:38:55 +0000">
<metadata tag="submitter" timestamp="Mon, 11 Jul 2005 17:42:40 +0000">
<metadata tag="bugReady" timestamp="Tue, 12 Jul 2005 08:00:32 +0000">