openSUSE Security Update : dhcp (openSUSE-2016-279)

This script is Copyright (C) 2016 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for dhcp fixes the following issues :

- CVE-2015-8605: A remote attacker could have used badly
formed packets with an invalid IPv4 UDP length field to
cause a DHCP server, client, or relay program to
terminate abnormally (boo#961305)

The following bugs were fixed :

- boo#936923: Improper lease duration checking

- boo#880984: Integer overflows in the date and time
handling code

- boo#956159: fixed service files to start dhcpd after

- boo#960506: Improve exit reason and logging when
/sbin/dhclient-script is unable to pre-init requested

- boo#947780: DHCP server could abort with 'Unable to set
up timer: out of range' on very long or infinite timer
intervals / lease lifetimes

- boo#912098: dhclient could pretend to run while silently
declining leases

- boo#919959: server: Do not log success report before
send reported success

- boo#928390: dhclient dit not expose next-server DHCPv4
option to script

- boo#926159: DHCP preferrend and valid lifetime would be
logged incorrectly

- boo#910686: Prevent a dependency conflict of dhcp-devel
with bind-devel package

See also :

Solution :

Update the affected dhcp packages.

Risk factor :

Medium / CVSS Base Score : 5.7

Family: SuSE Local Security Checks

Nessus Plugin ID: 89017 ()

Bugtraq ID:

CVE ID: CVE-2015-8605

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now