发布时间 :2001-03-26 00:00:00
修订时间 :2008-09-05 16:23:28

[原文]Format string vulnerability in the error logging code of DHCP server and client in Caldera Linux allows remote attackers to execute arbitrary commands.

[CNNVD]Caldera DHCP数据包格式化字符串漏洞(CNNVD-200103-101)

        Caldera Linux平台下DHCP服务器的密码错误信息存在格式化字符串漏洞。远程攻击者可以利用该漏洞执行任意命令。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  XF  dhcp-format-string

- 漏洞信息

Caldera DHCP数据包格式化字符串漏洞
危急 格式化字符串
2001-03-26 00:00:00 2006-09-05 00:00:00
        Caldera Linux平台下DHCP服务器的密码错误信息存在格式化字符串漏洞。远程攻击者可以利用该漏洞执行任意命令。

- 公告与补丁

        Upgrades available:
        Caldera OpenLinux Desktop 2.3
        SCO eServer 2.3.1
        SCO eDesktop 2.4

- 漏洞信息

Caldera Linux DHCP Server/Client Error Logging Code Format String
Local / Remote, Context Dependent Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2001-01-15 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Caldera DHCP Package Format String Vulnerabililty
Unknown 2215
Yes No
2001-01-15 12:00:00 2009-07-11 04:46:00
This vulnerability was first announced in a Caldera Security Advisory on January 15, 2001 via Bugtraq.

- 受影响的程序版本

SCO eServer 2.3.1
SCO eDesktop 2.4
Caldera OpenLinux Desktop 2.3

- 漏洞讨论

DHCP is the Dynamic Host Configuration Protocol, an open source, freely available, RFC specified networking protocol for host management. It is included with most versions of the UNIX Operating System.

A problem with the Caldera implementation could create the possibility of a format string attack. The problem affects both the DHCP daemon and client, and involves string formatting when passed through the error logging code. It is possible to pass custom crafted packets to both the DHCP daemon and DHCP client that will result in an error, and pass the formatted strings to a static buffer. This buffer will then be filled and overflowed, overwriting variables on the stack and potentially executing arbitrary code. This problem makes it possible for a user with malicious motives to execute arbitrary code, potentially gain access, and elevated privileges.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at:

- 解决方案

Upgrades available:

Caldera OpenLinux Desktop 2.3

SCO eServer 2.3.1

SCO eDesktop 2.4

- 相关参考