CVE-2007-5365

Publication date 11 October 2007

Last updated 24 July 2024


Ubuntu priority

Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.

Read the notes from the security team

Status

Package Ubuntu Release Status
dhcp 7.10 gutsy
Fixed 2.0pl5dfsg1-20ubuntu1.2
7.04 feisty
Fixed 2.0pl5-19.5ubuntu2.2
6.10 edgy
Fixed 2.0pl5-19.4ubuntu1.2
6.06 LTS dapper
Fixed 2.0pl5-19.4ubuntu0.2

Notes


kees

original Debian fix was incomplete, see https://bugzilla.redhat.com/show_bug.cgi?id=327781#c5

References

Related Ubuntu Security Notices (USN)

    • USN-531-2
    • dhcp vulnerability
    • 23 October 2007
    • USN-531-1
    • dhcp vulnerability
    • 22 October 2007

Other references