lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060316192748.266555A2A@lists.grok.org.uk> Date: Thu Mar 16 20:42:25 2006 From: abaker at gmail.com (ASB) Subject: -advisory- % x Thu Mar 16 14:27:45 EST 2006 x % Off-by-one in ISC DHCP -advisory- % x Thu Mar 16 14:27:45 EST 2006 x % Off-by-one in ISC DHCP 8==========================D~~~~~~~~~~ I. BACKGROUND There is no background. 8==========================D~~~~~~~~~~ II. DESCRIPTION It is possible to make ISC DHCP crash by the use of malformed input. 8==========================D~~~~~~~~~~ III. WORKAROUND There are no identified workarounds on this vulnerability. 8==========================D~~~~~~~~~~ IV. VENDOR RESPONSE ISC DHCP is presented no explanation on this problem indentified. 8==========================D~~~~~~~~~~ V. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-356572 to this issue 8==========================D~~~~~~~~~~ APPENDIX A VENDOR INFORMATION http://www.isc.org/index.pl?/sw/dhcp/ 8==========================D~~~~~~~~~~ APPENDIX B REFERENCES RFC 2898