lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20041105112220.GA3512@finlandia.infodrom.north.de> Date: Fri, 5 Nov 2004 12:22:21 +0100 From: Martin Schulze <joey@...odrom.org> To: Tarragon Allen <tarragon@...he.net.au> Cc: bugtraq@...urityfocus.com Subject: Re: debian dhcpd, old format string bug Tarragon Allen wrote: > > Debian dhcpd package. > > > > http://packages.debian.org/stable/net/dhcp > > > > It is vulnerable to the '02 format string bug. > > > > http://www.cert.org/advisories/CA-2002-12.html > > Firstly, good etiquette would have been for you to actually report the bug > with Debian. I don't see any bugs raised against any of the appropriate > packages regarding this. > > Secondly, the advisory you refer to is only mentioning DHCP 3.0+. The Debian > package you referred to is 2.0pl5. Perhaps you are referring to: > > http://packages.debian.org/stable/net/dhcp3-server > > Which is presently at 3.0.1rc9. The CERT advisory refers to 3.01 to 3.01r8 > inclusive. > > Are you saying the CERT advisory applies to other versions of DHCP? This is a different vulnerability than the one referenced to with CA-2002-12. This new vulnerability has been assigned CAN-2004-1006 in order to provide a unique identifier to this vulnerability. This vulnerability is only present in version 2.x of dhcp. The data for this id should become visible during the next days: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1006 Regards, Joey -- Given enough thrust pigs will fly, but it's not necessarily a good idea.
Powered by blists - more mailing lists