Debian DSA-1388-3 : dhcp - buffer overflow

critical Nessus Plugin ID 27515
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 7.4


The remote Debian host is missing a security-related update.


The patch used to correct the DHCP server buffer overflow in DSA-1388-1 was incomplete and did not adequately resolve the problem.
This update to the previous advisory makes updated packages based on a newer version of the patch available.

For completeness, please find below the original advisory :

It was discovered that dhcp, a DHCP server for automatic IP address assignment, didn't correctly allocate space for network replies. This could potentially allow a malicious DHCP client to execute arbitrary code upon the DHCP server.


Upgrade the dhcp packages.

For the stable distribution (etch), this problem has been fixed in version 2.0pl5-19.5etch2.

Updates to the old stable version (sarge) are pending.

See Also

Plugin Details

Severity: Critical

ID: 27515

File Name: debian_DSA-1388.nasl

Version: 1.24

Type: local

Agent: unix

Published: 10/19/2007

Updated: 1/4/2021

Dependencies: ssh_get_info.nasl

Risk Information

Risk Factor: Critical

VPR Score: 7.4

CVSS v2.0

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:dhcp, cpe:/o:debian:debian_linux:3.1, cpe:/o:debian:debian_linux:4.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/29/2007

Exploitable With

Core Impact

Reference Information

CVE: CVE-2007-5365, CVE-2008-5010

DSA: 1388

CWE: 119