Slackware 10.0 / 10.1 / 8.1 / 9.0 / 9.1 / current : dhcpcd DoS (SSA:2005-255-01)

This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.

Synopsis :

The remote Slackware host is missing a security update.

Description :

New dhcpcd packages are available for Slackware 8.1, 9.0, 9.1, 10.0,
10.1, and -current to fix a minor security issue. The dhcpcd daemon
can be tricked into reading past the end of the DHCP buffer by a
malicious DHCP server, which causes the dhcpcd daemon to crash and
results in a denial of service. Of course, a malicious DHCP server
could simply give you an IP address that wouldn't work, too, such as, but since people have been asking about this issue, here's
a fix, and that's the extent of the impact. In other words, very
little real impact. Even less detail about this issue may be found in
the Common Vulnerabilities and Exposures (CVE) database:

See also :

Solution :

Update the affected dhcpcd package.

Risk factor :

Medium / CVSS Base Score : 5.0

Family: Slackware Local Security Checks

Nessus Plugin ID: 19864 ()

Bugtraq ID:

CVE ID: CVE-2005-1848

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now