Debian: dhcp-client vulnerability

    Date28 Jul 2000
    CategoryDebian
    3102
    Posted ByLinuxSecurity Advisories
    Remote root exploit present in dhcp-client in debian 2.1 and 2.2.
    -----BEGIN PGP SIGNED MESSAGE-----
    
    - ------------------------------------------------------------------------
    Debian Security Advisory                             This email address is being protected from spambots. You need JavaScript enabled to view it. 
    http://www.debian.org/security/                            Michael Stone
    July 28, 2000
    - ------------------------------------------------------------------------
    
    Package: dhcp-client-beta (dhcp-client)
    Vulnerability type: remote root exploit
    Debian-specific: no
    
    The versions of the ISC DHCP client in debian 2.1 (slink) and debian 2.2
    (potato) are vulnerable to a root exploit. The OpenBSD team reports that
    the client inappropriately executes commands embedded in replies sent
    from a dhcp server. This means that a malicious dhcp server can execute
    commands on the client with root privilages. A previous Debian security
    advisory addressed this issue with package versions 2.0b1pl6-0.3 and
    2.0-3potato1, but ISC has released a newer patch since the original
    advisory. You should install the latest packages even if you upgraded
    when the last advisory was released.
    
    The reported vulnerability is fixed in the package dhcp-client-beta
    2.0b1pl6-0.4 for the current stable release (debian 2.1) and in
    dhcp-client 2.0-3potato2 for the frozen pre-release (debian 2.2). The
    dhcp server and relay agents are built from the same source as the
    client; however, the server and relay agents are not vulnerable to this
    issue and do not need to be upgraded.  We recommend upgrading your
    dhcp-client-beta and dhcp-client immediately.
    
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    
    Debian GNU/Linux 2.1 alias slink
    - --------------------------------
    
      This version of Debian was released only for Intel ia32, the Motorola
      680x0, the alpha and the Sun sparc architecture.
    
      Source archives:
         http://security.debian.org/dists/stable/updates/source/dhcp-beta_2.0b1pl6-0.4.diff.gz
          MD5 checksum: a6cb2d3ada66ce5ee6265cae14babcc7
         http://security.debian.org/dists/stable/updates/source/dhcp-beta_2.0b1pl6-0.4.dsc
          MD5 checksum: 148ec8de443e27a7df1c1c9343240a18
         http://security.debian.org/dists/stable/updates/source/dhcp-beta_2.0b1pl6.orig.tar.gz
          MD5 checksum: 2b63a90b272f087afb24c8f4ca72d3bd
    
      Alpha architecture:
         http://security.debian.org/dists/stable/updates/binary-alpha/dhcp-beta_2.0b1pl6-0.4_alpha.deb
          MD5 checksum: 16953e78d254b09c0e5ae4437435dc7f
         http://security.debian.org/dists/stable/updates/binary-alpha/dhcp-client-beta_2.0b1pl6-0.4_alpha.deb
          MD5 checksum: 357ec5766a1ec1807fd5180cb9529c23
         http://security.debian.org/dists/stable/updates/binary-alpha/dhcp-relay-beta_2.0b1pl6-0.4_alpha.deb
          MD5 checksum: 1b716855998f390c1e5b556f3fd8d011
    
      Intel ia32 architecture:
         http://security.debian.org/dists/stable/updates/binary-i386/dhcp-beta_2.0b1pl6-0.4_i386.deb
          MD5 checksum: dcd16de60fb440d49937b76db3c512b9
         http://security.debian.org/dists/stable/updates/binary-i386/dhcp-client-beta_2.0b1pl6-0.4_i386.deb
          MD5 checksum: c3c5fdbdfe28ed7ebfe4acdf793d2b32
         http://security.debian.org/dists/stable/updates/binary-i386/dhcp-relay-beta_2.0b1pl6-0.4_i386.deb
          MD5 checksum: 48f4e09491bf4ecfd8ca041ec5630191
    
      Motorola 680x0 architecture:
         http://security.debian.org/dists/stable/updates/binary-m68k/dhcp-beta_2.0b1pl6-0.4_m68k.deb
          MD5 checksum: 979348386229afd7cda4c265c5a96b46
         http://security.debian.org/dists/stable/updates/binary-m68k/dhcp-client-beta_2.0b1pl6-0.4_m68k.deb
          MD5 checksum: 3f2d639eb5c8c7b997aaaf309f5f5253
         http://security.debian.org/dists/stable/updates/binary-m68k/dhcp-relay-beta_2.0b1pl6-0.4_m68k.deb
          MD5 checksum: c5853a4ee1318f2cf0f9eafd8025375d
    
      Sun Sparc architecture:
         http://security.debian.org/dists/stable/updates/binary-sparc/dhcp-beta_2.0b1pl6-0.4_sparc.deb
          MD5 checksum: 2f2c21e092ea15cf57eb6bdf3dff7c5d
         http://security.debian.org/dists/stable/updates/binary-sparc/dhcp-client-beta_2.0b1pl6-0.4_sparc.deb
          MD5 checksum: 31b4b29303e4fca6166060635a22b169
         http://security.debian.org/dists/stable/updates/binary-sparc/dhcp-relay-beta_2.0b1pl6-0.4_sparc.deb
          MD5 checksum: 9f4fc4b7a26b9dd725387873cd808d05
    
      These files will be moved into
       ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.
    
    
    Debian GNU/Linux 2.2 alias potato
    - ---------------------------------
    
      Please note that woody has not been released yet. However since potato
      is very close to being released security updates are already being
      made available on security.debian.org. 
          
      Updates have been prepared for alpha, ia32, and sparc. These and other
      architectures will be included in the main potato distribution shortly.
    
      Source archives:
         http://security.debian.org/dists/potato/updates/main/source/dhcp_2.0-3potato2.diff.gz
          MD5 checksum: 23247550b0e3e63d5c9c80a5ae10eed3
         http://security.debian.org/dists/potato/updates/main/source/dhcp_2.0-3potato2.dsc
          MD5 checksum: 6af12e7b4993568ddfe41427c1c90b5e
         http://security.debian.org/dists/potato/updates/main/source/dhcp_2.0.orig.tar.gz
          MD5 checksum: eff5d5359a50f878e4c0da082bf10475
    
      Alpha architecture:
         http://security.debian.org/dists/potato/updates/main/binary-alpha/dhcp_2.0-3potato2_alpha.deb
          MD5 checksum: a7fef01c210b86218fcee724a2f1b72f
         http://security.debian.org/dists/potato/updates/main/binary-alpha/dhcp-client_2.0-3potato2_alpha.deb
          MD5 checksum: 9b48d7941658b015564a7892c2cc7c07
         http://security.debian.org/dists/potato/updates/main/binary-alpha/dhcp-relay_2.0-3potato2_alpha.deb
          MD5 checksum: 9c169dfd5a9fd38649a71faed211e61d
    
      Intel ia32 architecture:
         http://security.debian.org/dists/potato/updates/main/binary-i386/dhcp_2.0-3potato2_i386.deb
          MD5 checksum: a124872fc1fb2fe7297f3d8cec5e8b37
         http://security.debian.org/dists/potato/updates/main/binary-i386/dhcp-client_2.0-3potato2_i386.deb
          MD5 checksum: 608f3b10ee1c628f8bb89c19e1bf4e73
         http://security.debian.org/dists/potato/updates/main/binary-i386/dhcp-relay_2.0-3potato2_i386.deb
          MD5 checksum: be49880f6f81b3dcce7b1344f816b48e
    
      Sun Sparc architecture:
         http://security.debian.org/dists/potato/updates/main/binary-sparc/dhcp_2.0-3potato2_sparc.deb
          MD5 checksum: ee6122bbb20f97e82e24dd20e5c073a9
         http://security.debian.org/dists/potato/updates/main/binary-sparc/dhcp-client_2.0-3potato2_sparc.deb
          MD5 checksum: 3bd860486c270ed3c16424f4ad2ed989
         http://security.debian.org/dists/potato/updates/main/binary-sparc/dhcp-relay_2.0-3potato2_sparc.deb
          MD5 checksum: 445cad98027354c65d931b73b806f212
    
    For not yet released architectures please refer to the appropriate
    directory  ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
    
    
    -----BEGIN PGP SIGNATURE-----
    Version: 2.6.3ia
    Charset: noconv
    
    iQB1AwUBOYGXUKjZR/ntlUftAQHqXgL/XUrAxGOQRrVgg7wtLe8L7eVBDUsTyEUH
    bhix5OIZPsQaxfu0zE6Khw0dqIaE3ocjsCJU+DoLxgOcphl4y0z4WZubUfATu4iq
    WMpqCbp+orzgak9AJ6KKB2Sz71B9irxb
    =AbOn
    -----END PGP SIGNATURE-----
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"64","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":13.39,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"33","type":"x","order":"3","pct":29.46,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.