Server bug could give attackers control
By Sam Costello
(IDG) -- A vulnerability in the DHCP (Dynamic Host Configuration Protocol) server provided by the Internet Software Consortium (ISC) could allow attackers to take over affected servers, according to a security alert released by the CERT Coordination Center Wednesday.
The DHCP server, or daemon, provided by ISC allows administrators to centralize the management and assigning of IP addresses to devices. The ISC's DHCP implementation installs a component called NSUpdate by default that allows the DHCP server to send information about hosts on the network to a DNS (domain name server), CERT/CC (Computer Emergency Response Team/Coordination Center) said.
When the DNS server receives that information, it responds to the DHCP server acknowledging the transaction. When the DHCP server receives the message, it logs the transaction, CERT/CC said.
The vulnerability in the DHCP server comes in the code that logs the communication from the DNS server, CERT/CC said. The bug affects Versions 3 to 3.0.1 rc8 of ISC's DHCP implementation, CERT/CC said.
An attacker who successfully exploited the hole would be able to run code with the privileges of the DHCP server, which is often root, CERT/CC's alert said. Root privilege is the highest privilege level and allows a user complete control over a system.
To address the flaw, CERT/CC recommends that users apply vendor-supplied patches, disable the DHCP service if it is not needed, or apply the ingress-filtering techniques detailed in its alert.
Products from Hewlett-Packard, IBM, Lotus Software Group, Microsoft, as well as the NetBSD and FreeBSD operating systems, are not affected, CERT/CC said.
The CERT/Coordination Center is a government-funded security research and development body located at Carnegie Mellon University in Pittsburgh.
More information about the vulnerability can be found in CERT/CC's alert, located at www.cert.org/advisories/CA-2002-12.html.
Adventures in home networking
August 23, 2001
RELATED IDG.net STORIES:
'Cute' Trojan Horse spreading by e-mail
Security hole in MSN Chat, Messenger could run code
Q&A: Microsoft's Brian Valentine on security, trustworthy computing
Nimda, Code Red still alive
Gartner: Attacks exploit security indifference
Vivendi: Electronic vote may have been hacked
CIA warns of Chinese cyberattack preparations
IDG.net's Security & Antivirus channel
CERT Coordination Center
Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.
TECHNOLOGY TOP STORIES:
Report: SUVs pose danger to cars
New telemarketer tool trumps TeleZapper
Terra Lycos logs $2.2B loss
AOL to offer song downloads
Microsoft seeks fiscal fountain of youth
|Back to the top|