Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

DHCP:OPT:DHCPD-PKT-SIZE-BO

Severity

High

Recommended

No

Recommended Action

Drop

Category

DHCP

Keywords

Dhcpcd Packet Size Stack Buffer Overflow

Release Date

2013/01/08

Update Number

2223

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

DHCP: Dhcpcd Packet Size Stack Buffer Overflow


This signature detects attempts to exploit a known vulnerability in dhcpcd. It is due to insufficient validation on packets size supplied by DHCP clients. A remote attacker impersonating a DHCP server on the adjacent network could exploit this by sending a crafted packet to the target host. Successful exploitation would allow an attacker to inject arbitrary code into the DHCP Client.

Extended Description

dhcpcd is prone to a remote stack-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it into a fixed-length buffer. Successfully exploiting this issue allows a remote attacker to execute arbitrary code in the context of the application. Failed exploits will result in denial-of-service condition.

Affected Products

  • Debian Linux 6.0 amd64
  • Debian Linux 6.0 arm
  • Debian Linux 6.0 ia-32
  • Debian Linux 6.0 ia-64
  • Debian Linux 6.0 mips
  • Debian Linux 6.0 powerpc
  • Debian Linux 6.0 s/390
  • Debian Linux 6.0 sparc
  • dhcpcd 3.2.3

References

  • BugTraq: 53354
  • CVE: CVE-2012-2152

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out