Format string vulnerabilities in the logging routines for dynamic DNS code (print.c) of ISC DHCP daemon (DHCPD) 3 to 3.0.1rc8, with the NSUPDATE option enabled, allow remote malicious DNS servers to execute arbitrary code via format strings in a DNS server response.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Dhcpd | Isc | 3.0 (including) | 3.0 (including) |
Dhcpd | Isc | 3.0.1-rc1 (including) | 3.0.1-rc1 (including) |
Dhcpd | Isc | 3.0.1-rc2 (including) | 3.0.1-rc2 (including) |
Dhcpd | Isc | 3.0.1-rc3 (including) | 3.0.1-rc3 (including) |
Dhcpd | Isc | 3.0.1-rc4 (including) | 3.0.1-rc4 (including) |
Dhcpd | Isc | 3.0.1-rc5 (including) | 3.0.1-rc5 (including) |
Dhcpd | Isc | 3.0.1-rc6 (including) | 3.0.1-rc6 (including) |
Dhcpd | Isc | 3.0.1-rc7 (including) | 3.0.1-rc7 (including) |
Dhcpd | Isc | 3.0.1-rc8 (including) | 3.0.1-rc8 (including) |