[Subject Prev][Subject Next][Thread Prev][Thread Next][Subject Index][Thread Index]

[SECURITY-Debian] New verion of dhcp released



Vulnerability Type: Remote Root Exploit <--- ;/
FYI -- ravi

>>>>> "WA" == Wichert Akkerman <wichert@xxxxxxxxxx> writes:

    WA> -----BEGIN PGP SIGNED MESSAGE----- -
    WA> ------------------------------------------------------------------------
    WA> Debian Security Advisory security@xxxxxxxxxx
    WA> http://www.debian.org/security/ Michael Stone June 27, 2000 -
    WA> ------------------------------------------------------------------------

    WA> Package: dhcp-client-beta (dhcp-client) Vulnerability type:
    WA> remote root exploit Debian-specific: no

    WA> The versions of the ISC DHCP client in debian 2.1 (slink) and
    WA> debian 2.2 (potato) are vulnerable to a root exploit. The
    WA> OpenBSD team reports that the client inappropriately executes
    WA> commands embedded in replies sent from a dhcp server. This
    WA> means that a malicious dhcp server can execute commands on the
    WA> client with root privilages.

    WA> The reported vulnerability is fixed in the package
    WA> dhcp-client-beta 2.0b1pl6-0.3 for the current stable release
    WA> (debian 2.1) and in dhcp-client 2.0-3potato1 for the frozen
    WA> pre-release (debian 2.2). The dhcp server and relay agents are
    WA> built from the same source as the client; however, the server
    WA> and relay agents are not vulnerable to this issue and do not
    WA> need to be upgraded.  We recommend upgrading your
    WA> dhcp-client-beta and dhcp-client immediately.


    WA> wget url will fetch the file for you dpkg -i file.deb will
    WA> install the referenced file.


    WA> Debian GNU/Linux 2.1 alias slink -
    WA> --------------------------------

    WA>   This version of Debian was released only for Intel ia32, the
    WA> Motorola 680x0, the alpha and the Sun sparc architecture.

    WA>   Source archives:
    WA> http://security.debian.org/dists/stable/updates/source/dhcp-beta_2.0b1pl6-0.3.diff.gz
    WA> MD5 checksum: 90e5a3d2e299aad278b10186b02c1d7b
    WA> http://security.debian.org/dists/stable/updates/source/dhcp-beta_2.0b1pl6-0.3.dsc
    WA> MD5 checksum: 9d15d1043a092b103fdbac2827470d5b
    WA> http://security.debian.org/dists/stable/updates/source/dhcp-beta_2.0b1pl6.orig.tar.gz
    WA> MD5 checksum: 2b63a90b272f087afb24c8f4ca72d3bd

[...]

    WA>   Intel ia32 architecture:
    WA> http://security.debian.org/dists/stable/updates/binary-i386/dhcp-beta_2.0b1pl6-0.3_i386.deb
    WA> MD5 checksum: e499e80e9906c7e412df40a75a16ece4
    WA> http://security.debian.org/dists/stable/updates/binary-i386/dhcp-client-beta_2.0b1pl6-0.3_i386.deb
    WA> MD5 checksum: c139d79a9f4a19e12c36108897b8335c
    WA> http://security.debian.org/dists/stable/updates/binary-i386/dhcp-relay-beta_2.0b1pl6-0.3_i386.deb
    WA> MD5 checksum: 0040eba75e437b961070218e7c8c2949

[...]

    WA> Debian GNU/Linux 2.2 alias potato -
    WA> ---------------------------------

    WA>   Please note that potato has not been released yet. However
    WA> since it is in the final stages of the release process
    WA> security updates are already being distributed.

    WA>   Source archives:
    WA> http://security.debian.org/dists/potato/updates/main/source/dhcp_2.0-3potato1.diff.gz
    WA> MD5 checksum: 40d365a28b6278cdeea7208ca06b1bde
    WA> http://security.debian.org/dists/potato/updates/main/source/dhcp_2.0-3potato1.dsc
    WA> MD5 checksum: 31a4060c49ef699ddfb2d431450a8993
    WA> http://security.debian.org/dists/potato/updates/main/source/dhcp_2.0.orig.tar.gz
    WA> MD5 checksum: eff5d5359a50f878e4c0da082bf10475

[...]

    WA>   Intel ia32 architecture:
    WA> http://security.debian.org/dists/potato/updates/main/binary-i386/dhcp-client_2.0-3potato1_i386.deb
    WA> MD5 checksum: 73c893f4c87c20a48607fda52d34d7da
    WA> http://security.debian.org/dists/potato/updates/main/binary-i386/dhcp-relay_2.0-3potato1_i386.deb
    WA> MD5 checksum: b18ca08c0e0c3ceed171c08c881730c3
    WA> http://security.debian.org/dists/potato/updates/main/binary-i386/dhcp_2.0-3potato1_i386.deb
    WA> MD5 checksum: da3735ce715897893c88cfb7539749bf

[...]

    WA> For apt-get: deb http://security.debian.org/ stable updates
    WA> For dpkg-ftp: ftp://security.debian.org/debian-security
    WA> dists/stable/updates Mailing list:
    WA> debian-security-announce@xxxxxxxxxxxxxxxx


    WA> -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: noconv

    WA> iQB1AwUBOVok+KjZR/ntlUftAQEntwL+N8eMiJAVXoRA0WO9tKno7i+on9dCe/tw
    WA> R3I+yhEiWIg4MbNCkTdhQltNtV4936LrCAF0av38AlepA1Tm8BhxZQyyU6izGIM9
    WA> HPIuHQ70BhmRnHOacBUWq4BoBU11gIVp =v5Q9 -----END PGP
    WA> SIGNATURE-----


-- 
Ravikant K.Rao : http://www.symonds.net/~ravi/
Primary Email  : <ravi@xxxxxxxxxxx> | PGP: 9544A4A1   GPG: 1024D/C2FC752D
---
Visit our home page at: www.chennailug.org
Send e-mail to 'ilugc-request@xxxxxxxxxxxxxxxxxx' with 'unsubscribe' 
in either the subject or the body to unsubscribe from this list.