Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.54424
Category:FreeBSD Local Security Checks
Title:isc-dhcpd -- format string vulnerabilities
Summary:The remote host is missing an update to the system; as announced in the referenced advisory.
Description:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following packages are affected:

isc-dhcp3-client, isc-dhcp3-devel, isc-dhcp3-relay, isc-dhcp3-server, isc-dhcp3
isc-dhcp, isc-dhcpd

CVE-2004-1006
Format string vulnerability in the log functions in dhcpd for dhcp 2.x
allows remote DNS servers to execute arbitrary code via certain DNS
messages, a different vulnerability than CVE-2002-0702.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-1006
BugTraq ID: 11591
http://www.securityfocus.com/bid/11591
Bugtraq: 20041025 debian dhcpd, old format string bug (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2004-10/0287.html
Bugtraq: 20041105 Re: debian dhcpd, old format string bug (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2004-11/0037.html
http://marc.info/?l=bugtraq&m=109968710822449&w=2
CERT/CC vulnerability note: VU#448384
http://www.kb.cert.org/vuls/id/448384
Debian Security Information: DSA-584 (Google Search)
http://www.debian.org/security/2004/dsa-584
http://www.redhat.com/support/errata/RHSA-2005-212.html
XForce ISS Database: dhcp-log-format-string(17963)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17963
CopyrightCopyright (C) 2008 E-Soft Inc.

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.