USN-1108-1: DHCP vulnerability

Publication date

11 April 2011

Overview

An attacker’s DHCP server could send crafted responses to your computer and cause it to run programs as root.


Packages

Details

Sebastian Krahmer discovered that the dhclient utility incorrectly filtered
crafted responses. An attacker could use this flaw with a malicious DHCP
server to execute arbitrary code, resulting in root privilege escalation.

Sebastian Krahmer discovered that the dhclient utility incorrectly filtered
crafted responses. An attacker could use this flaw with a malicious DHCP
server to execute arbitrary code, resulting in root privilege escalation.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
9.10 karmic dhcp3-client –  3.1.2-1ubuntu7.2
8.04 hardy dhcp3-client –  3.0.6.dfsg-1ubuntu9.2
6.06 dapper dhcp3-client –  3.0.3-6ubuntu7.2
10.10 maverick dhcp3-client –  3.1.3-2ubuntu6.1
10.04 lucid dhcp3-client –  3.1.3-2ubuntu3.1

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›