SuSE 11.1 Security Update : dhcpcd (SAT Patch Number 4389)

This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.

Synopsis :

The remote SuSE 11 host is missing a security update.

Description :

A rogue DHCP server could instruct clients to use a host name that
contains shell meta characters. Since many scripts in the system do
not expect unusal characters in the system's host name the DHCP client
needs to sanitize the host name offered by the server. (CVE-2011-0996)

Note this update is actually just a re-release of the previous one.
The security fix made dhcpcd crash if the dhcp server sent a SIP
option that was not decodable.

This update also fixes the following non-security issues :

- 564441: e1000 and dhcpd hickup

- 579438: endless loop after adding wlan usb stick (with
dhcp ip lease time infinity)

- 654649: dhcpcd ignores -G (--nogateway) option and sets
default route

- 657402: dhcpcd sends RENEWAL as ethernet broadcast
instead of unicast

- 668194: dhcp client not working properly in Xen domU due
to partial checksum offload

- 672038: dhcpcd sends RENEWAL as ethernet broadcast
instead of unicast

See also :

Solution :

Apply SAT patch number 4389.

Risk factor :

Medium / CVSS Base Score : 6.8

Family: SuSE Local Security Checks

Nessus Plugin ID: 53501 ()

Bugtraq ID:

CVE ID: CVE-2011-0996

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now