Red Hat Customer Portal

Skip to main content

CVE-2009-0692

Impact:
Critical
Public Date:
2009-07-14
CWE:
CWE-130->CWE-121
Bugzilla:
507717: CVE-2009-0692 dhclient: stack overflow leads to arbitrary code execution as root

The MITRE CVE dictionary describes this issue as:

Stack-based buffer overflow in the script_write_params method in client/dhclient.c in ISC DHCP dhclient 4.1 before 4.1.0p1, 4.0 before 4.0.1p1, 3.1 before 3.1.2p1, 3.0, and 2.0 allows remote DHCP servers to execute arbitrary code via a crafted subnet-mask option.

Find out more about CVE-2009-0692 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue affected the dhcp packages as shipped with Red Hat Enterprise Linux 3 and 4. Updated packages to correct this issue are available via Red Hat Network:

https://rhn.redhat.com/errata/CVE-2009-0692.html

This issue did not affect the dhcp packages as shipped with Red Hat Enterprise Linux 5 due to the use of FORTIFY_SOURCE protection mechanism that changes the exploitability of the issue into a controlled application termination.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 8.3
Base Metrics AV:A/AC:L/Au:N/C:C/I:C/A:C
Access Vector Adjacent Network
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 4 (dhcp) RHSA-2009:1136 2009-07-14
Red Hat Enterprise Linux 3 (dhcp) RHSA-2009:1154 2009-07-14
Red Hat Enterprise Linux Extended Update Support 4.7 (dhcp) RHSA-2009:1136 2009-07-14