Vulnerability Name:

CVE-2002-0702 (CCN-9039)

Assigned:2002-05-08
Published:2002-05-08
Updated:2016-10-18
Summary:Format string vulnerabilities in the logging routines for dynamic DNS code (print.c) of ISC DHCP daemon (DHCPD) 3 to 3.0.1rc8, with the NSUPDATE option enabled, allow remote malicious DNS servers to execute arbitrary code via format strings in a DNS server response.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CALDERA
Type: UNKNOWN
CSSA-2002-028.0

Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2002-028.0
dhcpd dynamic DNS format string vulnerability

Source: VULNWATCH
Type: UNKNOWN
20020508 [VulnWatch] [NGSEC-2002-2] ISC DHCPDv3, remote root compromise

Source: MITRE
Type: CNA
CVE-2002-0702

Source: CCN
Type: Conectiva Linux Announcement CLSA-2002:483
dhcp

Source: CONECTIVA
Type: UNKNOWN
CLA-2002:483

Source: BUGTRAQ
Type: UNKNOWN
20020508 [NGSEC-2002-2] ISC DHCPDv3, remote root compromise

Source: CCN
Type: CERT Advisory CA-2002-12
Format String Vulnerability in ISC DHCPD

Source: CERT
Type: Patch, Third Party Advisory, US Government Resource
CA-2002-12

Source: CCN
Type: CIAC Information Bulletin M-079
Format String Vulnerability in ISC DHCPD

Source: CCN
Type: Internet Software Consortium Web site
DHCP

Source: XF
Type: Patch, Vendor Advisory
dhcpd-nsupdate-format-string(9039)

Source: CCN
Type: US-CERT VU#854315
ISC DHCPD contains format string vulnerability when logging DNS-update requests

Source: CERT-VN
Type: US Government Resource
VU#854315

Source: MANDRAKE
Type: Patch, Vendor Advisory
MDKSA-2002:037

Source: CCN
Type: Next Generation Security Technologies Security Advisory NGSEC-2002-2
ISC DHCPDv3, remote root compromise

Source: SUSE
Type: UNKNOWN
SuSE-SA:2002:019

Source: CCN
Type: OSVDB ID: 11527
ISC DHCP errwarn.c Logging Format String

Source: CCN
Type: OSVDB ID: 11552
ISC DHCP DNS Logging Remote Format String

Source: CCN
Type: OSVDB ID: 14433
ISC DHCP Daemon NSUPDATE Logging Routine Format String

Source: BID
Type: Patch, Vendor Advisory
4701

Source: CCN
Type: BID-4701
ISC DHCPD NSUPDATE Remote Format String Vulnerability

Source: XF
Type: UNKNOWN
dhcpd-nsupdate-format-string(9039)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:isc:dhcpd:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc1:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc2:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc3:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc4:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc5:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc6:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc7:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc8:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:isc:dhcpd:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc1:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc2:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc3:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc4:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc5:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc6:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc7:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc8:*:*:*:*:*:*
  • AND
  • cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_single_network_firewall:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_firewall:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_database_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    isc dhcpd 3.0
    isc dhcpd 3.0.1 rc1
    isc dhcpd 3.0.1 rc2
    isc dhcpd 3.0.1 rc3
    isc dhcpd 3.0.1 rc4
    isc dhcpd 3.0.1 rc5
    isc dhcpd 3.0.1 rc6
    isc dhcpd 3.0.1 rc7
    isc dhcpd 3.0.1 rc8
    isc dhcpd 3.0
    isc dhcpd 3.0.1 rc1
    isc dhcpd 3.0.1 rc2
    isc dhcpd 3.0.1 rc3
    isc dhcpd 3.0.1 rc4
    isc dhcpd 3.0.1 rc5
    isc dhcpd 3.0.1 rc6
    isc dhcpd 3.0.1 rc7
    isc dhcpd 3.0.1 rc8
    mandrakesoft mandrake linux 7.2
    mandrakesoft mandrake single network firewall 7.2
    suse suse linux 7.2
    mandrakesoft mandrake linux 8.1
    suse suse linux 7.3
    suse suse linux firewall *
    suse suse linux database server *
    suse suse email server iii
    suse suse linux connectivity server *
    mandrakesoft mandrake linux 8.2
    suse suse linux 8.0
    conectiva linux 8.0