From aliz@gentoo.org Fri Jan 17 14:22:34 2003 From: Daniel Ahlberg To: full-disclosure@lists.netsys.com Date: Fri, 17 Jan 2003 11:45:58 +0100 Subject: [Full-Disclosure] GLSA: dhcp -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200301-10 - - -------------------------------------------------------------------- PACKAGE : dhcp SUMMARY : buffer overflow DATE    : 2003-01-17 10:01 UTC EXPLOIT : remote - - -------------------------------------------------------------------- - From advisory : "The Internet Software Consortium (ISC) has discovered several buffer overflow vulnerabilities in their implementation of DHCP (ISC DHCPD). These vulnerabilities may allow remote attackers to execute arbitrary code on affected systems.  At this time, we are not aware of any exploits." Read the full advisory at http://www.cert.org/advisories/CA-2003-01.html SOLUTION It is recommended that all Gentoo Linux users who are running net-misc/dhcp upgrade to dhcp-3.0_p2 as follows: emerge sync emerge -u dhcp emerge clean - - -------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at www.gentoo.org/~aliz lostlogic@gentoo.org - - -------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQE+J97gfT7nyhUpoZMRAvWAAKCmwJ9SZ9BHqLlVSnpU6uuJdIGR+ACfXpTw ZFnl0fBTQKE3c0ymwNUdQT8= =Ukux -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html