|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for dhcp RHSA-2012:1140-01|
|Summary:||The remote host is missing an update for the 'dhcp'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'dhcp'
package(s) announced via the referenced advisory.
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows
individual devices on an IP network to get their own network configuration
information, including an IP address, a subnet mask, and a broadcast
A denial of service flaw was found in the way the dhcpd daemon handled
zero-length client identifiers. A remote attacker could use this flaw to
send a specially-crafted request to dhcpd, possibly causing it to enter an
infinite loop and consume an excessive amount of CPU time. (CVE-2012-3571)
Upstream acknowledges Markus Hietava of the Codenomicon CROSS project as
the original reporter of this issue.
Users of DHCP should upgrade to these updated packages, which contain a
backported patch to correct this issue. After installing this update, all
DHCP servers will be restarted automatically.
dhcp on Red Hat Enterprise Linux (v. 5 server)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2012-3571|
BugTraq ID: 54665
Debian Security Information: DSA-2516 (Google Search)
Debian Security Information: DSA-2519 (Google Search)
RedHat Security Advisories: RHSA-2012:1140
RedHat Security Advisories: RHSA-2012:1141
SuSE Security Announcement: openSUSE-SU-2012:1006 (Google Search)
|Copyright||Copyright (c) 2012 Greenbone Networks GmbH|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.