Arch Linux Security Advisory ASA-202106-11
=========================================
Severity: High
Date    : 2021-06-01
CVE-ID  : CVE-2021-25217
Package : dhcp
Type    : arbitrary code execution
Remote  : Yes
Link    : https://security.archlinux.org/AVG-2004

Summary
======
The package dhcp before version 4.4.2.P1-1 is vulnerable to arbitrary
code execution.

Resolution
=========
Upgrade to 4.4.2.P1-1.

# pacman -Syu "dhcp>=4.4.2.P1-1"

The problem has been fixed upstream in version 4.4.2.P1.

Workaround
=========
None.

Description
==========
A buffer overrun in the lease file parsing code can be used to exploit
a common vulnerability shared by dhcpd and dhclient before version
4.4.2-P1.

Impact
=====
An attacker could crash the DHCP server, or potentially execute
arbitrary code, through a crafted lease file.

References
=========
https://kb.isc.org/docs/cve-2021-25217
https://downloads.isc.org/isc/dhcp/4.4.2-P1/patches/4.4.2.CVE-2021-25217.patch
https://security.archlinux.org/CVE-2021-25217

ArchLinux: 202106-11: dhcp: arbitrary code execution

June 3, 2021

Summary

A buffer overrun in the lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient before version 4.4.2-P1.

Resolution

Upgrade to 4.4.2.P1-1. # pacman -Syu "dhcp>=4.4.2.P1-1"
The problem has been fixed upstream in version 4.4.2.P1.

References

https://kb.isc.org/docs/cve-2021-25217 https://downloads.isc.org/isc/dhcp/4.4.2-P1/patches/4.4.2.CVE-2021-25217.patch https://security.archlinux.org/CVE-2021-25217

Severity
Package : dhcp
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-2004

Workaround

None.

Related News