[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20041105112220.GA3512@finlandia.infodrom.north.de>
Date: Fri, 5 Nov 2004 12:22:21 +0100
From: Martin Schulze <joey@...odrom.org>
To: Tarragon Allen <tarragon@...he.net.au>
Cc: bugtraq@...urityfocus.com
Subject: Re: debian dhcpd, old format string bug
Tarragon Allen wrote:
> > Debian dhcpd package.
> >
> > http://packages.debian.org/stable/net/dhcp
> >
> > It is vulnerable to the '02 format string bug.
> >
> > http://www.cert.org/advisories/CA-2002-12.html
>
> Firstly, good etiquette would have been for you to actually report the bug
> with Debian. I don't see any bugs raised against any of the appropriate
> packages regarding this.
>
> Secondly, the advisory you refer to is only mentioning DHCP 3.0+. The Debian
> package you referred to is 2.0pl5. Perhaps you are referring to:
>
> http://packages.debian.org/stable/net/dhcp3-server
>
> Which is presently at 3.0.1rc9. The CERT advisory refers to 3.01 to 3.01r8
> inclusive.
>
> Are you saying the CERT advisory applies to other versions of DHCP?
This is a different vulnerability than the one referenced to with CA-2002-12.
This new vulnerability has been assigned CAN-2004-1006 in order to provide
a unique identifier to this vulnerability. This vulnerability is only
present in version 2.x of dhcp.
The data for this id should become visible during the next days:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1006
Regards,
Joey
--
Given enough thrust pigs will fly, but it's not necessarily a good idea.
Powered by blists - more mailing lists