Multiple stack-based buffer overflows in the error handling routines of the minires library, as used in the NSUPDATE capability for ISC DHCPD 3.0 through 3.0.1RC10, allow remote attackers to execute arbitrary code via a DHCP message containing a long hostname.
References
Link | Resource |
---|---|
http://www.cert.org/advisories/CA-2003-01.html | Patch Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/284857 | Patch Third Party Advisory US Government Resource |
http://www.redhat.com/support/errata/RHSA-2003-011.html | Patch Vendor Advisory |
http://www.debian.org/security/2003/dsa-231 | Patch Vendor Advisory |
http://archives.neohapsis.com/archives/bugtraq/2003-01/0250.html | |
http://www.ciac.org/ciac/bulletins/n-031.shtml | |
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000562 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2003:007 | |
http://www.openpkg.com/security/advisories/OpenPKG-SA-2003.002.html | |
http://www.securityfocus.com/bid/6627 | |
http://www.securitytracker.com/id?1005924 | |
http://www.suse.com/de/security/2003_006_dhcp.html | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/11073 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2003-01-16 21:00
Updated : 2017-07-10 18:29
NVD link : CVE-2003-0026
Mitre link : CVE-2003-0026
JSON object : View
CWE
Products Affected
isc
- dhcpd