CVE Database


Impact: Critical
Public: 2009-07-14
CWE: CWE-130->CWE-121
Bugzilla: 507717: CVE-2009-0692 dhclient: stack overflow leads to arbitrary code execution as root
IAVA: 2009-A-0105


The MITRE CVE dictionary describes this issue as:

Stack-based buffer overflow in the script_write_params method in client/dhclient.c in ISC DHCP dhclient 4.1 before 4.1.0p1, 4.0 before 4.0.1p1, 3.1 before 3.1.2p1, 3.0, and 2.0 allows remote DHCP servers to execute arbitrary code via a crafted subnet-mask option.

Find out more about CVE-2009-0692 from the MITRE CVE dictionary and NIST NVD.


This issue affected the dhcp packages as shipped with Red Hat Enterprise Linux 3 and 4. Updated packages to correct this issue are available via Red Hat Network:
This issue did not affect the dhcp packages as shipped with Red Hat Enterprise Linux 5 due to the use of FORTIFY_SOURCE protection mechanism that changes the exploitability of the issue into a controlled application termination.

CVSS v2 metrics

Base Score: 8.3
Base Metrics: AV:A/AC:L/Au:N/C:C/I:C/A:C
Access Vector: Adjacent Network
Access Complexity: Low
Authentication: None
Confidentiality Impact: Complete
Integrity Impact: Complete
Availability Impact: Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
Red Hat Enterprise Linux ES EUS (v. 4.7) (dhcp) RHSA-2009:1136 July 14, 2009
Red Hat Enterprise Linux version 3 (dhcp) RHSA-2009:1154 July 14, 2009
Red Hat Enterprise Linux version 4 (dhcp) RHSA-2009:1136 July 14, 2009

External References

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.