Vulnerability Name: CVE-2003-0026 (CCN-11073) Assigned: 2003-01-15 Published: 2003-01-15 Updated: 2017-07-11 Summary: Multiple stack-based buffer overflows in the error handling routines of the minires library, as used in the NSUPDATE capability for ISC DHCPD 3.0 through 3.0.1RC10, allow remote attackers to execute arbitrary code via a DHCP message containing a long hostname. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Gain Access References: Source: BUGTRAQ Type: UNKNOWN20030122 [securityslackware.com: [slackware-security] New DHCP packages available] Source: MITRE Type: CNACVE-2003-0026 Source: CONECTIVA Type: UNKNOWNCLA-2003:562 Source: CCN Type: RHSA-2003-011Updated dhcp packages fix security vulnerabilities Source: CCN Type: SECTRACK ID: 1005924ISC DHCPD Minires Library Buffer Overflows Let Remote Users Execute Arbitrary Code Source: CCN Type: CERT Advisory CA-2003-01Buffer Overflows in ISC DHCPD Minires Library Source: CERT Type: Patch, Third Party Advisory, US Government ResourceCA-2003-01 Source: CCN Type: CIAC Information Bulletin N-031Buffer Overflows in ISC DHCPD Minires Library Source: CIAC Type: UNKNOWNN-031 Source: DEBIAN Type: Patch, Vendor AdvisoryDSA-231 Source: DEBIAN Type: DSA-231dhcp3 -- stack overflows Source: CCN Type: Internet Software Consortium Web siteInternet Software Consortium - DHCP Source: CCN Type: US-CERT VU#284857ISC DHCPD minires library contains multiple buffer overflows Source: CERT-VN Type: Patch, Third Party Advisory, US Government ResourceVU#284857 Source: CCN Type: Gentoo Linux Security Announcement 200301-10dhcp -- buffer overflow Source: CCN Type: Conectiva Linux Security Announcement CLSA-2003:562dhcp -- Remote Vulnerability Source: MANDRAKE Type: UNKNOWNMDKSA-2003:007 Source: CCN Type: OpenPKG-SA-2003.002DHCPd Source: OPENPKG Type: UNKNOWNOpenPKG-SA-2003.002 Source: CCN Type: OSVDB ID: 14557ICS DHCP minires Library Multiple Overflows Source: REDHAT Type: Patch, Vendor AdvisoryRHSA-2003:011 Source: BID Type: UNKNOWN6627 Source: CCN Type: BID-6627ISC DHCPD NSUPDATE MiniRes Library Remote Buffer Overflow Vulnerabilities Source: SECTRACK Type: UNKNOWN1005924 Source: CCN Type: slackware-security Mailing List, Sun, 19 Jan 2003 12:44:17 -0800 (PST)[slackware-security] New DHCP packages available Source: SUSE Type: UNKNOWNSuSE-SA:2003:006 Source: CCN Type: TLSA-2003-6Buffer overflows Source: XF Type: UNKNOWNdhcpd-minires-multiple-bo(11073) Source: XF Type: UNKNOWNdhcpd-minires-multiple-bo(11073) Source: SUSE Type: SUSE-SA:2003:0006dhcp: remote system compromise Vulnerable Configuration: Configuration 1 :cpe:/a:isc:dhcpd:3.0:*:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc1:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc2:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc3:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc4:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc5:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc6:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc7:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc8:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:isc:dhcpd:3.0:*:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc1:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc10:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc2:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc3:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc4:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc5:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc6:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc7:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc8:*:*:*:*:*:* OR cpe:/a:isc:dhcpd:3.0.1:rc9:*:*:*:*:*:* AND cpe:/o:redhat:linux:7:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_single_network_firewall:7.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_database_server:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:1.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:8.1:*:*:*:*:*:*:* OR cpe:/o:novell:suse_linux_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_office_server:*:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:1.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:* OR cpe:/a:suse:suse_email_server:3.1:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:current:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.1::ia64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.2::ppc:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
isc dhcpd 3.0
isc dhcpd 3.0.1 rc1
isc dhcpd 3.0.1 rc2
isc dhcpd 3.0.1 rc3
isc dhcpd 3.0.1 rc4
isc dhcpd 3.0.1 rc5
isc dhcpd 3.0.1 rc6
isc dhcpd 3.0.1 rc7
isc dhcpd 3.0.1 rc8
isc dhcpd 3.0
isc dhcpd 3.0.1 rc1
isc dhcpd 3.0.1 rc10
isc dhcpd 3.0.1 rc2
isc dhcpd 3.0.1 rc3
isc dhcpd 3.0.1 rc4
isc dhcpd 3.0.1 rc5
isc dhcpd 3.0.1 rc6
isc dhcpd 3.0.1 rc7
isc dhcpd 3.0.1 rc8
isc dhcpd 3.0.1 rc9
redhat linux 7
mandrakesoft mandrake linux 7.2
suse suse linux 7.0
suse suse linux 7.1
redhat linux 7.1
mandrakesoft mandrake single network firewall 7.2
suse suse linux 7.2
mandrakesoft mandrake linux 8.1
redhat linux 7.2
suse suse linux 7.3
suse suse linux database server *
suse suse email server iii
suse suse linux connectivity server *
openpkg openpkg 1.0
mandrakesoft mandrake linux 8.2
suse suse linux 8.0
conectiva linux 8.0
redhat linux 7.3
debian debian linux 3.0
slackware slackware linux 8.1
novell suse linux enterprise server *
openpkg openpkg current
gentoo linux *
suse suse linux office server *
redhat linux 8.0
openpkg openpkg 1.1
mandrakesoft mandrake linux 9.0
suse suse email server 3.1
suse suse linux 8.1
mandrakesoft mandrake multi network firewall 8.2
slackware slackware linux current
mandrakesoft mandrake linux 8.1
mandrakesoft mandrake linux 8.2