openSUSE Security Update : dhcp (openSUSE-2016-284)

Medium Nessus Plugin ID 89050


The remote openSUSE host is missing a security update.


This update for dhcp fixes the following issues :

- CVE-2015-8605: A remote attacker could have used badly formed packets with an invalid IPv4 UDP length field to cause a DHCP server, client, or relay program to terminate abnormally (bsc#961305)

The following bugs were fixed :

- bsc#936923: Improper lease duration checking

- bsc#880984: Integer overflows in the date and time handling code

- bsc#956159: fixed service files to start dhcpd after slapd

- bsc#960506: Improve exit reason and logging when /sbin/dhclient-script is unable to pre-init requested interface

This update was imported from the SUSE:SLE-12-SP1:Update update project.


Update the affected dhcp packages.

See Also

Plugin Details

Severity: Medium

ID: 89050

File Name: openSUSE-2016-284.nasl

Version: $Revision: 2.5 $

Type: local

Agent: unix

Published: 2016/03/01

Modified: 2016/10/13

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5.7

Vector: CVSS2#AV:A/AC:M/Au:N/C:N/I:N/A:C


Base Score: 6.5

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:dhcp, p-cpe:/a:novell:opensuse:dhcp-client, p-cpe:/a:novell:opensuse:dhcp-client-debuginfo, p-cpe:/a:novell:opensuse:dhcp-debuginfo, p-cpe:/a:novell:opensuse:dhcp-debugsource, p-cpe:/a:novell:opensuse:dhcp-devel, p-cpe:/a:novell:opensuse:dhcp-relay, p-cpe:/a:novell:opensuse:dhcp-relay-debuginfo, p-cpe:/a:novell:opensuse:dhcp-server, p-cpe:/a:novell:opensuse:dhcp-server-debuginfo, cpe:/o:novell:opensuse:42.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2016/02/29

Reference Information

CVE: CVE-2015-8605