search menu icon-carat-right cmu-wordmark

CERT Coordination Center

ISC DHCPD contains format string vulnerability when logging DNS-update requests

Vulnerability Note VU#854315

Original Release Date: 2002-05-08 | Last Revised: 2003-01-13

Overview

The DHCP daemon (DHCPD) is a server that is used to allocate network addresses and assign configuration parameters to dynamically configured hosts. A format string vulnerability may permit an intruder to execute code with the privileges of the DHCP daemon (typically root).

Description

The Internet Software Consortium (ISC) produces a DHCP server. DHCPD listens for requests from client machines connecting to the network. Versions 3 to 3.0.1rc8 inclusive of DHCPD contain an option (NSUPDATE) that is compiled in by default. NSUPDATE allows the DHCP server to send an update to the DNS server after processing a DHCP request. The DNS server responds by sending a message back to the DHCP server. The response from the DNS server can contain user-supplied data. When this message is received, the DHCP server logs the transaction. A format string vulnerability exists in the DHCPD code that logs the transaction. This vulnerability may permit an attacker to execute code with the privileges of the DHCP daemon.

Impact

A remote attacker can execute arbitrary code on the vulnerable host with the privileges of the DHCP server (DHCPD), typically root.

Solution

Obtain a patch from vendor.

If you cannot upgrade, apply the following patch.

--- common/print.c Tue Apr 9 13:41:17 2002
+++ common/print.c.patched Tue Apr 9 13:41:56 2002
@@ -1366,8 +1366,8 @@
*s++ = '.';
*s++ = 0;
if (errorp)
- log_error (obuf);
+ log_error ("%s",obuf);
else
- log_info (obuf);
+ log_info ("%s",obuf);
}
#endif /* NSUPDATE */

Vendor Information

854315
 

View all 48 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

The CERT Coordination Center acknowledges Next Generation Security Technologies as the discoverer of this vulnerability and thanks them and The Internet Software Consortium (ISC) for their cooperation, reporting and analysis of this vulnerability.

This document was written by Ian A. Finlay.

Other Information

CVE IDs: CVE-2002-0702
CERT Advisory: CA-2002-12
Severity Metric: 46.17
Date Public: 2002-05-08
Date First Published: 2002-05-08
Date Last Updated: 2003-01-13 17:32 UTC
Document Revision: 48

Sponsored by CISA.