lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200410281031.38332.tarragon@onthe.net.au>
Date: Thu, 28 Oct 2004 10:31:38 +1000
From: Tarragon Allen <tarragon@...he.net.au>
To: bugtraq@...urityfocus.com
Subject: Re: debian dhcpd, old format string bug


On Tuesday 26 October 2004 10:37, infamous41md@...pop.com wrote:
> Subject:
>
> Debian dhcpd package.
>
> http://packages.debian.org/stable/net/dhcp
>
> It is vulnerable to the '02 format string bug.
>
> http://www.cert.org/advisories/CA-2002-12.html

Firstly, good etiquette would have been for you to actually report the bug 
with Debian. I don't see any bugs raised against any of the appropriate 
packages regarding this.

Secondly, the advisory you refer to is only mentioning DHCP 3.0+. The Debian 
package you referred to is 2.0pl5. Perhaps you are referring to:

http://packages.debian.org/stable/net/dhcp3-server

Which is presently at 3.0.1rc9. The CERT advisory refers to 3.01 to 3.01r8 
inclusive.

Are you saying the CERT advisory applies to other versions of DHCP?

t
-- 
http://moto-coda.org/public.gpg.key


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ