MiracleLinux 4 : dhcp-4.1.1-19.P1.AXS4.1 (AXSA:2011-427:03)

high Nessus Plugin ID 284115

Synopsis

The remote MiracleLinux host is missing one or more security updates.

Description

The remote MiracleLinux 4 host has packages installed that are affected by multiple vulnerabilities as referenced in the AXSA:2011-427:03 advisory.

DHCP (Dynamic Host Configuration Protocol) is a protocol which allows individual devices on an IP network to get their own network configuration information (IP address, subnetmask, broadcast address, etc.) from a DHCP server. The overall purpose of DHCP is to make it easier to administer a large network. The dhcp package includes the ISC DHCP service and relay agent.
To use DHCP on your network, install a DHCP service (or relay agent), and on clients run a DHCP client daemon. The dhcp package provides the ISC DHCP service and relay agent.
Security issues fixed with this release:
CVE-2011-2748 The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.
CVE-2011-2749 The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.
Fixed bugs:
- Added the DHCRELAYARGS variable to the /etc/sysconfig/dhcrelay configuration file to pass additional arguments to the dhcrelay daemon
- The dhclient utility now logs its PID properly in syslog entries.
- Fixed the dhclient date strings parsing in lease files.
- Now, while updating the search entry, the dhclient utility always adds the domain part of the host name given to the client if it is missing.
- The dhcpd service with IPv6 could someitmes create a lease file that it was unable to parse. The service would then go into a loop and not start after being restarted. This has been fixed.
- Some ISPs DHCP servers send their clients 576 for the interface-mtu option value. Such a low MTU can cause throughput problems with UDP traffic. The dhclient utility now sets the interface MTU only if the value obtained from the server is higher than 576.
- added the LICENSE file to the dhclient package.
Enhancements:
- Implemented the Classless Static Route Options for DHCPv4 (RFC 3442), which supplies network route configuration to a large number of hosts without individual configuration of each one.
- Added support for IPoIB (IP over InfiniBand) interfaces.

Tenable has extracted the preceding description block directly from the MiracleLinux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected dhclient and / or dhcp packages.

See Also

https://tsn.miraclelinux.com/en/node/2141

Plugin Details

Severity: High

ID: 284115

File Name: miracle_linux_AXSA-2011-427.nasl

Version: 1.1

Type: local

Published: 1/14/2026

Updated: 1/14/2026

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

Vendor

Vendor Severity: High

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2011-2749

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:miracle:linux:dhcp, cpe:/o:miracle:linux:4, p-cpe:/a:miracle:linux:dhclient

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/MiracleLinux/release, Host/MiracleLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 12/28/2011

Vulnerability Publication Date: 8/10/2011

Reference Information

CVE: CVE-2011-2748, CVE-2011-2749