FreeBSD : dhcpcd -- multiple vulnerabilities (df587aa2-b5a5-11e5-9728-002590263bf5)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Nico Golde reports :

heap overflow via malformed dhcp responses later in print_option (via
dhcp_envoption1) due to incorrect option length values. Exploitation
is non-trivial, but I'd love to be proven wrong.

invalid read/crash via malformed dhcp responses. not exploitable
beyond DoS as far as I can judge.

See also :

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=206015
http://www.nessus.org/u?73ee920a
http://www.nessus.org/u?11fcb7bb
http://www.openwall.com/lists/oss-security/2016/01/07/3
http://www.nessus.org/u?63815379

Solution :

Update the affected package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 87791 ()

Bugtraq ID:

CVE ID: CVE-2016-1503
CVE-2016-1504

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now