openSUSE Security Update : dhcp (openSUSE-2016-284)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for dhcp fixes the following issues :

- CVE-2015-8605: A remote attacker could have used badly
formed packets with an invalid IPv4 UDP length field to
cause a DHCP server, client, or relay program to
terminate abnormally (bsc#961305)

The following bugs were fixed :

- bsc#936923: Improper lease duration checking

- bsc#880984: Integer overflows in the date and time
handling code

- bsc#956159: fixed service files to start dhcpd after
slapd

- bsc#960506: Improve exit reason and logging when
/sbin/dhclient-script is unable to pre-init requested
interface

This update was imported from the SUSE:SLE-12-SP1:Update update
project.

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=880984
https://bugzilla.opensuse.org/show_bug.cgi?id=936923
https://bugzilla.opensuse.org/show_bug.cgi?id=956159
https://bugzilla.opensuse.org/show_bug.cgi?id=960506
https://bugzilla.opensuse.org/show_bug.cgi?id=961305

Solution :

Update the affected dhcp packages.

Risk factor :

Medium / CVSS Base Score : 5.7
(CVSS2#AV:A/AC:M/Au:N/C:N/I:N/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 89050 ()

Bugtraq ID:

CVE ID: CVE-2015-8605

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now