DHCP: Option LOG-BUF-OVERFLOW

This anomaly detects that the length of a DHCP Host Name or Client ID option is to long. This can indicate that your system is under attack

Extended Description

ISC DHCPD is prone to a remotely exploitable buffer overflow vulnerability. This issue exists in routines responsible for logging hostname options provided by DHCP clients. Successful exploitation could result in execution of arbitrary code in the context of the DHCPD server. This issue is reported to affect ISC DHCPD versions 3.0.1rc12 and 3.0.1rc13. The vulnerable code exists in previous versions of ISC DHCPD 3, but is only believed to be exploitable in these two releases.

Affected Products

Infoblox dns_one_appliance,Mandriva linux_mandrake

Short Name
DHCP:OPT:LOG-BUF-OVERFLOW
Severity
Minor
Recommended
False
Recommended Action
None
Category
DHCP
Keywords
BUFFER CVE-2004-0892 LOG OVERFLOW bid:10590
Release Date
11/07/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Isc

Mandriva

Suse

Red_hat

Infoblox

CVSS Score

7.5

Found a potential security threat?