From owner-freebsd-ports Sun Jun 25 8:30: 7 2000 Delivered-To: freebsd-ports@freebsd.org Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (Postfix) with ESMTP id AD8EB37BBBB for ; Sun, 25 Jun 2000 08:30:01 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.9.3/8.9.2) id IAA78474; Sun, 25 Jun 2000 08:30:01 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: from point.osg.gov.bc.ca (point.osg.gov.bc.ca [142.32.102.44]) by hub.freebsd.org (Postfix) with ESMTP id 8BDC937BB03 for ; Sun, 25 Jun 2000 08:20:45 -0700 (PDT) (envelope-from Cy.Schubert@uumail.gov.bc.ca) Received: (from daemon@localhost) by point.osg.gov.bc.ca (8.8.7/8.8.8) id IAA30871 for ; Sun, 25 Jun 2000 08:20:44 -0700 Received: from passer.osg.gov.bc.ca(142.32.110.29) via SMTP by point.osg.gov.bc.ca, id smtpda30869; Sun Jun 25 08:20:26 2000 Received: (from cschuber@localhost) by passer.osg.gov.bc.ca (8.9.3/8.9.1) id IAA18154; Sun, 25 Jun 2000 08:20:26 -0700 (PDT) Message-Id: <200006251520.IAA18154@passer.osg.gov.bc.ca> Date: Sun, 25 Jun 2000 08:20:26 -0700 (PDT) From: Cy.Schubert@uumail.gov.bc.ca Reply-To: Cy.Schubert@uumail.gov.bc.ca To: FreeBSD-gnats-submit@freebsd.org X-Send-Pr-Version: 3.2 Subject: ports/19503: isc-dhcp3 port root exploit Sender: owner-freebsd-ports@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 19503 >Category: ports >Synopsis: isc-dhcp3 root exploit >Confidential: no >Severity: critical >Priority: high >Responsible: freebsd-ports >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Sun Jun 25 08:30:00 PDT 2000 >Closed-Date: >Last-Modified: >Originator: Cy Schubert >Release: FreeBSD 4.0-STABLE i386 >Organization: UNIX Group, ITSD, ISTA, Province of BC >Environment: FreeBSD passer 4.0-STABLE FreeBSD 4.0-STABLE #0: Fri Jun 23 13:38:31 PDT 2000 root@:/opt/cvs-400s-000620/src/sys/compile/PASSER i386 >Description: From BUGTRAQ: Date: Sat, 24 Jun 2000 02:28:58 -0700 Reply-To: Ted Lemon Sender: Bugtraq List From: Ted Lemon Subject: Possible root exploit in ISC DHCP client. To: BUGTRAQ@SECURITYFOCUS.COM Resent-To: cy@passer.osg.gov.bc.ca Resent-Date: Sat, 24 Jun 2000 12:15:21 -0700 Resent-From: Cy Schubert Somebody at OpenBSD discovered a possible root exploit in the ISC DHCP client. This exploit is present in all versions of the ISC DHCP client prior to 2.0pl1 and 3.0b1pl14, which I just released this evening. Anybody who is using versions of the ISC DHCP client other than these is strongly urged to upgrade. I would appreciate it if the OpenBSD people would take a look at the new version to see if they believe it is a complete fix, and let me know if it isn't. In any case, thanks for catching the error! I'm sorry I'm being so vague about how this got found, but I don't have time to read bugtraq anymore, so I was notified roughly fourth-hand. The ISC DHCP distribution is available at ftp://ftp.isc.org/isc/DHCP, and anonymous CVS at http://www.isc.org/products/DHCP/anoncvs.html. The head of the tree in anonymous CVS also contains the fix. _MelloN_ >How-To-Repeat: N/A >Fix: Upgrade isc-dhcp3 port to 3.0b1pl14. >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message