CVE-2009-0692

Stack-based buffer overflow in the script_write_params method in client/dhclient.c in ISC DHCP dhclient 4.1 before 4.1.0p1, 4.0 before 4.0.1p1, 3.1 before 3.1.2p1, 3.0, and 2.0 allows remote DHCP servers to execute arbitrary code via a crafted subnet-mask option.
References
Link Resource
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-010.txt.asc
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00003.html
http://secunia.com/advisories/35785 Vendor Advisory
http://secunia.com/advisories/35829
http://secunia.com/advisories/35830
http://secunia.com/advisories/35831
http://secunia.com/advisories/35832
http://secunia.com/advisories/35841
http://secunia.com/advisories/35849
http://secunia.com/advisories/35850
http://secunia.com/advisories/35851
http://secunia.com/advisories/35880
http://secunia.com/advisories/36457
http://secunia.com/advisories/37342
http://secunia.com/advisories/40551
http://security.gentoo.org/glsa/glsa-200907-12.xml
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561471
http://www.debian.org/security/2009/dsa-1833
http://www.kb.cert.org/vuls/id/410676 US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2009:151
http://www.osvdb.org/55819
http://www.redhat.com/support/errata/RHSA-2009-1136.html
http://www.redhat.com/support/errata/RHSA-2009-1154.html
http://www.securityfocus.com/bid/35668
http://www.securitytracker.com/id?1022548
http://www.ubuntu.com/usn/usn-803-1
http://www.vupen.com/english/advisories/2009/1891
http://www.vupen.com/english/advisories/2010/1796
https://bugzilla.redhat.com/show_bug.cgi?id=507717
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10758
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5941
https://www.isc.org/downloadables/12
https://www.isc.org/node/468 Patch Vendor Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01177.html
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00340.html
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-010.txt.asc
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00003.html
http://secunia.com/advisories/35785 Vendor Advisory
http://secunia.com/advisories/35829
http://secunia.com/advisories/35830
http://secunia.com/advisories/35831
http://secunia.com/advisories/35832
http://secunia.com/advisories/35841
http://secunia.com/advisories/35849
http://secunia.com/advisories/35850
http://secunia.com/advisories/35851
http://secunia.com/advisories/35880
http://secunia.com/advisories/36457
http://secunia.com/advisories/37342
http://secunia.com/advisories/40551
http://security.gentoo.org/glsa/glsa-200907-12.xml
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561471
http://www.debian.org/security/2009/dsa-1833
http://www.kb.cert.org/vuls/id/410676 US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2009:151
http://www.osvdb.org/55819
http://www.redhat.com/support/errata/RHSA-2009-1136.html
http://www.redhat.com/support/errata/RHSA-2009-1154.html
http://www.securityfocus.com/bid/35668
http://www.securitytracker.com/id?1022548
http://www.ubuntu.com/usn/usn-803-1
http://www.vupen.com/english/advisories/2009/1891
http://www.vupen.com/english/advisories/2010/1796
https://bugzilla.redhat.com/show_bug.cgi?id=507717
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10758
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5941
https://www.isc.org/downloadables/12
https://www.isc.org/node/468 Patch Vendor Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01177.html
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00340.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:isc:dhcp:2.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:3.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:3.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:00

Type Values Removed Values Added
References () http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-010.txt.asc - () http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-010.txt.asc -
References () http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083 - () http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083 -
References () http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00003.html - () http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00003.html -
References () http://secunia.com/advisories/35785 - Vendor Advisory () http://secunia.com/advisories/35785 - Vendor Advisory
References () http://secunia.com/advisories/35829 - () http://secunia.com/advisories/35829 -
References () http://secunia.com/advisories/35830 - () http://secunia.com/advisories/35830 -
References () http://secunia.com/advisories/35831 - () http://secunia.com/advisories/35831 -
References () http://secunia.com/advisories/35832 - () http://secunia.com/advisories/35832 -
References () http://secunia.com/advisories/35841 - () http://secunia.com/advisories/35841 -
References () http://secunia.com/advisories/35849 - () http://secunia.com/advisories/35849 -
References () http://secunia.com/advisories/35850 - () http://secunia.com/advisories/35850 -
References () http://secunia.com/advisories/35851 - () http://secunia.com/advisories/35851 -
References () http://secunia.com/advisories/35880 - () http://secunia.com/advisories/35880 -
References () http://secunia.com/advisories/36457 - () http://secunia.com/advisories/36457 -
References () http://secunia.com/advisories/37342 - () http://secunia.com/advisories/37342 -
References () http://secunia.com/advisories/40551 - () http://secunia.com/advisories/40551 -
References () http://security.gentoo.org/glsa/glsa-200907-12.xml - () http://security.gentoo.org/glsa/glsa-200907-12.xml -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561471 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561471 -
References () http://www.debian.org/security/2009/dsa-1833 - () http://www.debian.org/security/2009/dsa-1833 -
References () http://www.kb.cert.org/vuls/id/410676 - US Government Resource () http://www.kb.cert.org/vuls/id/410676 - US Government Resource
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:151 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:151 -
References () http://www.osvdb.org/55819 - () http://www.osvdb.org/55819 -
References () http://www.redhat.com/support/errata/RHSA-2009-1136.html - () http://www.redhat.com/support/errata/RHSA-2009-1136.html -
References () http://www.redhat.com/support/errata/RHSA-2009-1154.html - () http://www.redhat.com/support/errata/RHSA-2009-1154.html -
References () http://www.securityfocus.com/bid/35668 - () http://www.securityfocus.com/bid/35668 -
References () http://www.securitytracker.com/id?1022548 - () http://www.securitytracker.com/id?1022548 -
References () http://www.ubuntu.com/usn/usn-803-1 - () http://www.ubuntu.com/usn/usn-803-1 -
References () http://www.vupen.com/english/advisories/2009/1891 - () http://www.vupen.com/english/advisories/2009/1891 -
References () http://www.vupen.com/english/advisories/2010/1796 - () http://www.vupen.com/english/advisories/2010/1796 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=507717 - () https://bugzilla.redhat.com/show_bug.cgi?id=507717 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10758 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10758 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5941 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5941 -
References () https://www.isc.org/downloadables/12 - () https://www.isc.org/downloadables/12 -
References () https://www.isc.org/node/468 - Patch, Vendor Advisory () https://www.isc.org/node/468 - Patch, Vendor Advisory
References () https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01177.html - () https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01177.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00340.html - () https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00340.html -

Information

Published : 2009-07-14 20:30

Updated : 2024-11-21 01:00


NVD link : CVE-2009-0692

Mitre link : CVE-2009-0692

CVE.ORG link : CVE-2009-0692


JSON object : View

Products Affected

isc

  • dhcp
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer