CERT Reports Potential Compromise in Common DHCP Server

The dhcp daemon released by the Internet Software Consortium has a common programming error that could lead to administrative or root compromise of hosts running a dhcp server.

By Michael Hall | Posted May 9, 2002
Page of   |  Back to Page 1
Print ArticleEmail Article
  • Share on Facebook
  • Share on Twitter
  • Share on LinkedIn

CERT has issued a security advisory regarding a format string vulnerability in dhcpd, a piece of server software released by the Internet Software Consortium (ISC) and used to allocate network addresses and set other essential network connection settings to clients. The organization has released a patch to the server.

CERT reports that a quick fix involves ingress filtering of tcp and udp packets on ports 67 and 68 (bootpc) to insure external hosts are kept from accessing the vulnerable server.

The current list of vendors in the advisory reporting a vulnerability include Alcatel, and Conectiva Linux. A longer list of all vendors is available on an update page maintained by CERT, (see Resources, below) which the organization will update as vendors report on their products. Currently the majority of UNIX and Linux vendors, Apple, Dell, and Compaq are listed as "unknown." Microsoft reports that its operating systems do not ship with the ISC's dhcpd server and are not affected.

A format string vulnerability involves the deliberate passing of input to a program that causes it to execute arbitrary instructions. In the case of software that runs with administrative or root privileges, these instructions can then be used to gain control of the computer running the vulnerable software, or simply perform malicious or damaging actions.

Resources:

Comment and Contribute
(Maximum characters: 1200). You have
characters left.
Get the Latest Scoop with Enterprise Networking Planet Newsletter