Vulnerabilities > CVE-2002-0702 - Unspecified vulnerability in ISC Dhcpd 3.0/3.0.1
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Format string vulnerabilities in the logging routines for dynamic DNS code (print.c) of ISC DHCP daemon (DHCPD) 3 to 3.0.1rc8, with the NSUPDATE option enabled, allow remote malicious DNS servers to execute arbitrary code via format strings in a DNS server response.
Exploit-Db
description | ISC DHCPD 2.0/3.0.1 NSUPDATE Remote Format String Vulnerability. CVE-2002-0702. Remote exploit for bsd platform |
id | EDB-ID:21440 |
last seen | 2016-02-02 |
modified | 2002-05-08 |
published | 2002-05-08 |
reporter | Andi |
source | https://www.exploit-db.com/download/21440/ |
title | ISC DHCPD 2.0/3.0.1 NSUPDATE Remote Format String Vulnerability |
Nessus
NASL family | Mandriva Local Security Checks |
NASL id | MANDRAKE_MDKSA-2002-037.NASL |
description | Fermin J. Serna discovered a problem in the dhcp server and client package from versions 3.0 to 3.0.1rc8, which are affected by a format string vulnerability that can be exploited remotely. By default, these versions of DHCP are compiled with the dns update feature enabled, which allows DHCP to update DNS records. The code that logs this update has an exploitable format string vulnerability; the update message can contain data provided by the attacker, such as a hostname. A successful exploitation could give the attacker elevated privileges equivalent to the user running the DHCP daemon, which is the user dhcpd in Mandrake Linux 8.x, but root in earlier versions. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 13942 |
published | 2004-07-31 |
reporter | This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/13942 |
title | Mandrake Linux Security Advisory : dhcp (MDKSA-2002:037) |
code |
|
References
- ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-028.0.txt
- ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-028.0.txt
- http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0063.html
- http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0063.html
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000483
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000483
- http://marc.info/?l=bugtraq&m=102089498828206&w=2
- http://marc.info/?l=bugtraq&m=102089498828206&w=2
- http://www.cert.org/advisories/CA-2002-12.html
- http://www.cert.org/advisories/CA-2002-12.html
- http://www.iss.net/security_center/static/9039.php
- http://www.iss.net/security_center/static/9039.php
- http://www.kb.cert.org/vuls/id/854315
- http://www.kb.cert.org/vuls/id/854315
- http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-037.php
- http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-037.php
- http://www.novell.com/linux/security/advisories/2002_19_dhcp.html
- http://www.novell.com/linux/security/advisories/2002_19_dhcp.html
- http://www.securityfocus.com/bid/4701
- http://www.securityfocus.com/bid/4701