Summary
The remote host is missing an update to dhcpcd
announced via advisory DSA 2498-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202498-1
Insight
It was discovered that dhcpcd, a DHCP client, was vulnerable to a stack overflow. A malformed DHCP message could crash the client, causing a denial of service, and potentially remote code execution through properly designed malicous DHCP packets.
For the stable distribution (squeeze), this problem has been fixed in version 1:3.2.3-5+squeeze1.
For the testing distribution (wheezy), this problem has been fixed in version 1:3.2.3-11.
For the unstable distribution (sid), this problem has been fixed in version 1:3.2.3-11.
We recommend that you upgrade your dhcpcd package.
Severity
Classification
-
CVE CVE-2012-2152 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities