Debian DSA-1388-3 : dhcp - buffer overflow

critical Nessus Plugin ID 27515
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote Debian host is missing a security-related update.


The patch used to correct the DHCP server buffer overflow in DSA-1388-1 was incomplete and did not adequately resolve the problem.
This update to the previous advisory makes updated packages based on a newer version of the patch available.

For completeness, please find below the original advisory :

It was discovered that dhcp, a DHCP server for automatic IP address assignment, didn't correctly allocate space for network replies. This could potentially allow a malicious DHCP client to execute arbitrary code upon the DHCP server.


Upgrade the dhcp packages.

For the stable distribution (etch), this problem has been fixed in version 2.0pl5-19.5etch2.

Updates to the old stable version (sarge) are pending.

See Also

Plugin Details

Severity: Critical

ID: 27515

File Name: debian_DSA-1388.nasl

Version: 1.24

Type: local

Agent: unix

Published: 10/19/2007

Updated: 1/4/2021

Dependencies: ssh_get_info.nasl

Risk Information


Risk Factor: High

Score: 7.4


Risk Factor: Critical

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:dhcp, cpe:/o:debian:debian_linux:3.1, cpe:/o:debian:debian_linux:4.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/29/2007

Exploitable With

Core Impact

Reference Information

CVE: CVE-2007-5365, CVE-2008-5010

DSA: 1388

CWE: 119