Computer Security
[EN] securityvulns.ru no-pyccku


OpenBSD DHCP server buffer overflow
updated since 12.10.2007
Published:05.11.2007
Source:
SecurityVulns ID:8244
Type:remote
Threat Level:
7/10
Description:Integer overflow with "maximum message size" option leads to buffer overflow.
Affected:OPENBSD : OpenBSD 4.0
 OPENBSD : OpenBSD 4.1
 OPENBSD : OpenBSD 4.2
CVE:CVE-2007-5365 (Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2 allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.)
 CVE-2007-0063
Original documentdocumentCORE SECURITY TECHNOLOGIES ADVISORIES, CORE-2007-0928: Stack-based buffer overflow vulnerability in OpenBSD’s DHCP server (12.10.2007)
Files:DoS Exploit for DHCPd bug

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod