Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

DHCP:ISC-PRETTY-PRINT-BO

Severity

Major

Recommended

Yes

Recommended Action

Drop

Category

DHCP

Keywords

ISC DHCP dhclient pretty_print_option Stack Buffer Overflow

Release Date

2018/04/05

Update Number

3053

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

DHCP: ISC DHCP dhclient pretty_print_option Stack Buffer Overflow


This detects attempt to exploit a stack-based buffer overflow vulnerability which has been reported in ISC DHCP dhclient. A remote attacker on the local network can exploit this vulnerability by sending a malicious response to a vulnerable client. Successful exploitation could result in the execution of arbitrary code under the context of the dhclient process.

Extended Description

Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0

Affected Products

  • Isc dhcp 4.1.0
  • Isc dhcp 4.1.1
  • Isc dhcp 4.1.2
  • Isc dhcp 4.1-esv
  • Isc dhcp 4.2.0
  • Isc dhcp 4.2.1
  • Isc dhcp 4.2.2
  • Isc dhcp 4.2.3
  • Isc dhcp 4.2.4
  • Isc dhcp 4.2.5
  • Isc dhcp 4.2.6
  • Isc dhcp 4.2.7
  • Isc dhcp 4.3.0
  • Isc dhcp 4.3.1
  • Isc dhcp 4.3.2
  • Isc dhcp 4.3.3
  • Isc dhcp 4.3.5
  • Isc dhcp 4.4.0

References

  • CVE: CVE-2018-5732

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out