Package: dhcp Severity: grave Tags: security Justification: user security hole
Hi The following CVE[0] has been issued against dhcp. CVE-2007-5365: Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2 allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU. A patch is attached below. Please tell me, if you want to take care of it or if i should upload. Cheers Steffen [0]: http://ve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5365 diff -u dhcp-2.0pl5dfsg1/debian/changelog dhcp-2.0pl5dfsg1/debian/changelog --- dhcp-2.0pl5dfsg1/debian/changelog +++ dhcp-2.0pl5dfsg1/debian/changelog @@ -1,3 +1,12 @@ +dhcp (2.0pl5dfsg1-20.1) unstable; urgency=high + + * Non-maintainer upload by the testing-security team + * Fix stack-based buffer overflow in options.c, which allows arbitrary + code execution or cause of a DoS through remote attackers + Fixes: CVE-2007-5365 + + -- Steffen Joeris <[EMAIL PROTECTED]> Fri, 12 Oct 2007 12:33:17 +0000 + dhcp (2.0pl5dfsg1-20) unstable; urgency=medium * Taking over unmaintained package. only in patch2: unchanged: --- dhcp-2.0pl5dfsg1.orig/debian/patches/305_CVE-2007-5365.patch +++ dhcp-2.0pl5dfsg1/debian/patches/305_CVE-2007-5365.patch @@ -0,0 +1,16 @@ +--- options.c.orig 2007-10-12 12:22:41.000000000 +0000 ++++ dhcp-2.0pl5dfsg1/common/options.c 2007-10-12 12:23:42.000000000 +0000 +@@ -188,9 +188,12 @@ + inpacket && + inpacket -> options [DHO_DHCP_MAX_MESSAGE_SIZE].data && + (inpacket -> options [DHO_DHCP_MAX_MESSAGE_SIZE].len >= +- sizeof (u_int16_t))) ++ sizeof (u_int16_t))){ + mms = getUShort (inpacket -> options + [DHO_DHCP_MAX_MESSAGE_SIZE].data); ++ if (mms < 576) ++ mms = 576; /* mms must be >= minimum IP MTU */ ++ } + + /* If the client has provided a maximum DHCP message size, + use that; otherwise, if it's BOOTP, only 64 bytes; otherwise -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]