In association with heise online

11 October 2007, 12:28

OpenBSD closes vulnerability in DHCP server

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

Security service provider Core Security has reported the discovery of a vulnerability in the OpenBSD DHCP server (dhcpd). Attackers could cause the service to crash in local networks by means of specially crafted DHCP requests A buffer overflow occurs in the function cons_options in src/usr.sbin/dhcpd/options.c when handling of improper values for the maximum message size.

One of the results is that clients are no longer automatically assigned a new IP address. Core Security says that the flaw cannot be exploited to inject code. A similar flaw was also recently reported in the DHCP server used by VMware. According to the security advisory, the implementation in VMware is also based on that in OpenBSD. OpenBSD versions 4.0, 4.1, and 4.2 are affected. A patch has been released to remedy the problem.

See also:


Print Version | Send by email | Permalink:

  • July's Community Calendar

The H Open

The H Security

The H Developer

The H Internet Toolkit