Pardus alert 2011-71 (dhcp)
| From: | Meltem Parmaksız <meltem@pardus.org.tr> | |
| To: | pardus-security@pardus.org.tr | |
| Subject: | [Pardus-security] [PLSA 2011-71] DHCP: Arbitrary Command Execution | |
| Date: | Tue, 3 May 2011 14:12:10 +0300 | |
| Message-ID: | <201105031412.10989.meltem@pardus.org.tr> |
------------------------------------------------------------------------ Pardus Linux Security Advisory 2011-71 security@pardus.org.tr ------------------------------------------------------------------------ Date: 2011-05-02 Type: Remote ------------------------------------------------------------------------ Summary ======= A vulnerability have been fixed in dhcp, which allows remote attackers to execute arbitrary commands Description =========== CVE-2011-0997: dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message. Affected packages: Pardus 2009: dhcp, all before 4.2.1_p1-26-9 Resolution ========== There are update(s) for dhcp. You can update them via Package Manager or with a single command from console: pisi up dhcp References ========== * http://bugs.pardus.org.tr/show_bug.cgi?id=17807 ------------------------------------------------------------------------ _______________________________________________ Pardus-Security mailing list Pardus-Security@pardus.org.tr http://liste.pardus.org.tr/mailman/listinfo/pardus-security
