|Bugzilla:||507717: CVE-2009-0692 dhclient: stack overflow leads to arbitrary code execution as root|
The MITRE CVE dictionary describes this issue as:
Stack-based buffer overflow in the script_write_params method in client/dhclient.c in ISC DHCP dhclient 4.1 before 4.1.0p1, 4.0 before 4.0.1p1, 3.1 before 3.1.2p1, 3.0, and 2.0 allows remote DHCP servers to execute arbitrary code via a crafted subnet-mask option.
This issue affected the dhcp packages as shipped with Red Hat Enterprise Linux 3 and 4. Updated packages to correct this issue are available via Red Hat Network:
This issue did not affect the dhcp packages as shipped with Red Hat Enterprise Linux 5 due to the use of FORTIFY_SOURCE protection mechanism that changes the exploitability of the issue into a controlled application termination.
CVSS v2 metrics
|Access Vector:||Adjacent Network|
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Red Hat security errata
|Red Hat Enterprise Linux ES EUS (v. 4.7) (dhcp)||RHSA-2009:1136||July 14, 2009|
|Red Hat Enterprise Linux version 3 (dhcp)||RHSA-2009:1154||July 14, 2009|
|Red Hat Enterprise Linux version 4 (dhcp)||RHSA-2009:1136||July 14, 2009|
This page is generated automatically and has not been checked for errors or omissions.
For clarification or corrections please contact the Red Hat Security Response Team.