search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Microsoft DHCP Client service contains a buffer overflow

Vulnerability Note VU#257164

Original Release Date: 2006-07-11 | Last Revised: 2006-07-13

Overview

Microsoft DHCP Client service contains a buffer overflow. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.

Description

Dynamic Host Configuration Protocol (DHCP)

As described in RFC 2131, "The Dynamic Host Configuration Protocol (DHCP) provides a framework for passing configuration information to hosts on a TCP/IP network."

The Problem

The Microsoft DHCP Client service contains a buffer overflow. If a remote attacker responds to a DHCP request with a specially crafted DHCP response, that attacker may be able to trigger the buffer overflow on the requesting system.

For more information refer to Microsoft Security Bulletin MS06-036.

Impact

A remote, unauthenticated attacker may be able to execute arbitrary code.

Solution

Apply a patch from your vendor

Microsoft addresses this vulnerability with the updates listed in Microsoft Security Bulletin MS06-036.

Vendor Information

257164
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported in Microsoft Security Bulletin MS06-036. Microsoft credits Mariano Nu༞z Di Croce of Cybsec Security Systems for providing information regarding this vulnerability.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2006-2372
Severity Metric: 78.00
Date Public: 2006-07-11
Date First Published: 2006-07-11
Date Last Updated: 2006-07-13 21:21 UTC
Document Revision: 11

Sponsored by CISA.