Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

OS:LINUXX86:BOOTP-OF

Severity

Critical

Recommended

No

Recommended Action

Drop

Category

OS

Keywords

Linux x86 BOOTP Buffer Overflow

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

OS: Linux x86 BOOTP Buffer Overflow


This signature detects attempts to exploit a known vulnerability in the netstd package included with Debian GNU/LINUX. Because bootp does not provide proper bounds checking when handling the boot file and location as specified in a bootp request packet and the error logging facility, attackers can remotely gain root access.

Extended Description

The netstd package, included with the Debian GNU/Linux distribution is vulnerable to two buffer overflow attacks. The first is in the bootp server, the second in the FTP client. Bootpd version 2.4.3(and earlier) is prone to a number of buffer overflow conditions that may allow a remote attacker to fully compromise a host running a vulnerable version. This is due to improper bounds checking in the handling of the boot file/location specified in a bootp request packet, and in the error logging facility. This vulnerability is specific to the bootp daemon and any Unix distributions that ship with the affected version should be considered vulnerable. A buffer overflow condition also exists in the netstd FTP client, which may be exploited by a local attacker to potentially elevate privileges.

Affected Products

  • Debian Linux 1.1.0
  • Debian Linux 1.2.0
  • Debian Linux 1.3.0
  • Debian Linux 1.3.1
  • Debian Linux 2.0.0
  • Stanford University bootpd 2.4.3

References

  • BugTraq: 324
  • CVE: CVE-1999-0799

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out