[LWN Logo]
[Timeline]
Date:         Mon, 15 Jan 2001 17:06:47 -0700
From: Caldera Support Info <sup-info@LOCUTUS4.CALDERASYSTEMS.COM>
Subject:      Caldera Systems Security Advisory
To: BUGTRAQ@SECURITYFOCUS.COM

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________
		   Caldera Systems, Inc.  Security Advisory

Subject:		security problems in dhcp
Advisory number: 	CSSA-2001-003.0
Issue date: 		2001 January, 12
Cross reference:
______________________________________________________________________________


1. Problem Description

   The DHCP server and client shipped as part of OpenLinux
   had security problems in the error logging code. An
   attacker can potentially overflow a static buffer, and
   provide a string containing formatting directives.

2. Vulnerable Versions

   System                       Package
   -----------------------------------------------------------
   OpenLinux Desktop 2.3        All packages previous to
   				dhcpd-1.0pl2-4

   OpenLinux eServer 2.3.1      All packages previous to
   and OpenLinux eBuilder       dhcp2-2.0-1

   OpenLinux eDesktop 2.4	All packages previous to
                                dhcp-2.0b1pl29-2

3. Solution

   Workaround:

     none

   The proper solution is to upgrade to the fixed packages

4. OpenLinux Desktop 2.3

   4.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/

       The corresponding source code package can be found at:

       ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/SRPMS

   4.2 Verification

       eca24327ed103c02a9799bf04a9a7094  RPMS/dhcpd-1.0pl2-4.i386.rpm
       ba5d3067b4d4eca8a36d8a4c63f33ba2  SRPMS/dhcpd-1.0pl2-4.src.rpm

   4.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

	  rpm -Fhv dhcpd-1.0pl2-4.i386.rpm

5. OpenLinux eServer 2.3.1 and OpenLinux eBuilder for ECential 3.0

   5.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/

       The corresponding source code package can be found at:

       ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/SRPMS

   5.2 Verification

       7d97d64396ab2ac7985cc2f0289850c9  RPMS/dhcp2-2.0-1.i386.rpm
       c58d5fa028f934b5d28092cf18e04919  SRPMS/dhcp2-2.0-1.src.rpm

   5.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

	  rpm -Fhv dhcp2-2.0-1.i386.rpm

6. OpenLinux eDesktop 2.4

   6.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/

       The corresponding source code package can be found at:

       ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/SRPMS

   6.2 Verification

       50c2533cc0d2baf90c81a253705dd985  RPMS/dhcp-2.0b1pl29-2.i386.rpm
       963b467e66479761810219aaa63688cf  SRPMS/dhcp-2.0b1pl29-2.src.rpm

   6.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

	  rpm -Fhv dhcp-2.0b1pl29-2.i386.rpm

7. References

   This and other Caldera security resources are located at:

   http://www.calderasystems.com/support/security/index.html

   This security fix closes Caldera's internal Problem Report 8668.

8. Disclaimer

   Caldera Systems, Inc. is not responsible for the misuse of any of the
   information we provide on this website and/or through our security
   advisories. Our advisories are a service to our customers intended to
   promote secure installation and use of Caldera OpenLinux.

9. Acknowledgements

   Caldera Systems, Inc. wishes to thank the Team at Immunix, Greg KH
   at Wirex and Gert Doering for their cooperation.

______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE6X3iT18sy83A/qfwRAp3tAKCOGIGs8AUqd6eoUL0stkj3PstfTQCgudVK
lo6+ze+QIunS8mayaYtPg6I=
=Yc/3
-----END PGP SIGNATURE-----