Vulnerability Name: CVE-2002-0702 (CCN-9039) Assigned: 2002-05-08 Published: 2002-05-08 Updated: 2016-10-18 Summary: Format string vulnerabilities in the logging routines for dynamic DNS code (print.c) of ISC DHCP daemon (DHCPD) 3 to 3.0.1rc8, with the NSUPDATE option enabled, allow remote malicious DNS servers to execute arbitrary code via format strings in a DNS server response. CVSS v3 Severity: 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-Other Vulnerability Consequences: Gain Access References: Source: CALDERA Type: UNKNOWNCSSA-2002-028.0 Source: CCN Type: Caldera International, Inc. Security Advisory CSSA-2002-028.0dhcpd dynamic DNS format string vulnerability Source: VULNWATCH Type: UNKNOWN20020508 [VulnWatch] [NGSEC-2002-2] ISC DHCPDv3, remote root compromise Source: MITRE Type: CNACVE-2002-0702 Source: CCN Type: Conectiva Linux Announcement CLSA-2002:483dhcp Source: CONECTIVA Type: UNKNOWNCLA-2002:483 Source: BUGTRAQ Type: UNKNOWN20020508 [NGSEC-2002-2] ISC DHCPDv3, remote root compromise Source: CCN Type: CERT Advisory CA-2002-12Format String Vulnerability in ISC DHCPD Source: CERT Type: Patch, Third Party Advisory, US Government ResourceCA-2002-12 Source: CCN Type: CIAC Information Bulletin M-079Format String Vulnerability in ISC DHCPD Source: CCN Type: Internet Software Consortium Web siteDHCP Source: XF Type: Patch, Vendor Advisorydhcpd-nsupdate-format-string(9039) Source: CCN Type: US-CERT VU#854315ISC DHCPD contains format string vulnerability when logging DNS-update requests Source: CERT-VN Type: US Government ResourceVU#854315 Source: MANDRAKE Type: Patch, Vendor AdvisoryMDKSA-2002:037 Source: CCN Type: Next Generation Security Technologies Security Advisory NGSEC-2002-2ISC DHCPDv3, remote root compromise Source: SUSE Type: UNKNOWNSuSE-SA:2002:019 Source: CCN Type: OSVDB ID: 11527ISC DHCP errwarn.c Logging Format String Source: CCN Type: OSVDB ID: 11552ISC DHCP DNS Logging Remote Format String Source: CCN Type: OSVDB ID: 14433ISC DHCP Daemon NSUPDATE Logging Routine Format String Source: BID Type: Patch, Vendor Advisory4701 Source: CCN Type: BID-4701ISC DHCPD NSUPDATE Remote Format String Vulnerability Source: XF Type: UNKNOWNdhcpd-nsupdate-format-string(9039) Vulnerable Configuration: Configuration 1 :cpe:/a:isc:dhcpd:3.0:*:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc1:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc2:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc3:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc4:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc5:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc6:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc7:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc8:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:isc:dhcpd:3.0:*:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc1:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc2:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc3:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc4:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc5:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc6:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc7:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc8:*:*:*:*:*:* AND cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_single_network_firewall:7.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_firewall:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_database_server:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
isc dhcpd 3.0
isc dhcpd 3.0.1 rc1
isc dhcpd 3.0.1 rc2
isc dhcpd 3.0.1 rc3
isc dhcpd 3.0.1 rc4
isc dhcpd 3.0.1 rc5
isc dhcpd 3.0.1 rc6
isc dhcpd 3.0.1 rc7
isc dhcpd 3.0.1 rc8
isc dhcpd 3.0
isc dhcpd 3.0.1 rc1
isc dhcpd 3.0.1 rc2
isc dhcpd 3.0.1 rc3
isc dhcpd 3.0.1 rc4
isc dhcpd 3.0.1 rc5
isc dhcpd 3.0.1 rc6
isc dhcpd 3.0.1 rc7
isc dhcpd 3.0.1 rc8
mandrakesoft mandrake linux 7.2
mandrakesoft mandrake single network firewall 7.2
suse suse linux 7.2
mandrakesoft mandrake linux 8.1
suse suse linux 7.3
suse suse linux firewall *
suse suse linux database server *
suse suse email server iii
suse suse linux connectivity server *
mandrakesoft mandrake linux 8.2
suse suse linux 8.0
conectiva linux 8.0