DHCP: Option LOG-BUF-OVERFLOW
This anomaly detects that the length of a DHCP Host Name or Client ID option is to long. This can indicate that your system is under attack
Extended Description
ISC DHCPD is prone to a remotely exploitable buffer overflow vulnerability. This issue exists in routines responsible for logging hostname options provided by DHCP clients. Successful exploitation could result in execution of arbitrary code in the context of the DHCPD server. This issue is reported to affect ISC DHCPD versions 3.0.1rc12 and 3.0.1rc13. The vulnerable code exists in previous versions of ISC DHCPD 3, but is only believed to be exploitable in these two releases.
Affected Products
Infoblox dns_one_appliance,Mandriva linux_mandrake
References
BugTraq: 10590
CVE: CVE-2004-0892
URL: http://www.kb.cert.org/vuls/id/317350 http://www.microsoft.com/technet/security/bulletin/MS04-042.mspx
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Isc
Mandriva
Suse
Red_hat
Infoblox
7.5