Skip to navigation

Security Advisory PXE server crashes from certain DHCP packets

Advisory: RHSA-2002:162-12
Type: Security Advisory
Severity: N/A
Issued on: 2002-07-29
Last updated on: 2002-08-30
Affected Products: Red Hat Linux 6.2
Red Hat Linux 7.0
Red Hat Linux 7.1
Red Hat Linux 7.2
Red Hat Linux 7.3
CVEs (cve.mitre.org): CVE-2002-0835

Details

Updated PXE packages are now available for Red Hat Linux which fix a
vulnerability that can crash the PXE server using certain DHCP packets.

The PXE package contains the PXE (Preboot eXecution Environment)
server and code needed for Linux to boot from a boot disk image on a
Linux PXE server.

It was found that the PXE server could be crashed using DHCP packets from
some Voice Over IP (VOIP) phones. This bug could be used to cause a denial
of service attack on remote systems by using malicious packets.

Users of PXE are advised to upgrade to the new release which contains a
version of PXE that is not vulnerable to this issue.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Linux 6.2

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/pxe/0.1-31.100.6.2/SRPMS/pxe-0.1-31.100.6.2.src.rpm
Missing file
    MD5: aece8aebd2265dfac76ac528f883e4f2
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/pxe/0.1-31.100.6.2/i386/pxe-0.1-31.100.6.2.i386.rpm
Missing file
    MD5: 7869c858f80009cf22a1235417cfc3c7
 
Red Hat Linux 7.0

SRPMS:
ftp://updates.redhat.com/rhn/public/2703533/pxe/0.1-31.99.7.3/SRPMS/pxe-0.1-31.99.7.3.src.rpm
Missing file
    MD5: fb0aac937bdb8a13cc22a8aa6254cfc7
ftp://updates.redhat.com/rhn/repository/NULL/pxe/0.1-31.99.7.3/SRPMS/pxe-0.1-31.99.7.3.src.rpm
Missing file
    MD5: fb0aac937bdb8a13cc22a8aa6254cfc7
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/pxe/0.1-31.99.7.3/i386/pxe-0.1-31.99.7.3.i386.rpm
Missing file
    MD5: 391d65eb419642d2e5d57507b1b8546e
 
Red Hat Linux 7.1

SRPMS:
ftp://updates.redhat.com/rhn/public/2703533/pxe/0.1-31.99.7.3/SRPMS/pxe-0.1-31.99.7.3.src.rpm
Missing file
    MD5: fb0aac937bdb8a13cc22a8aa6254cfc7
ftp://updates.redhat.com/rhn/repository/NULL/pxe/0.1-31.99.7.3/SRPMS/pxe-0.1-31.99.7.3.src.rpm
Missing file
    MD5: fb0aac937bdb8a13cc22a8aa6254cfc7
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/pxe/0.1-31.99.7.3/i386/pxe-0.1-31.99.7.3.i386.rpm
Missing file
    MD5: 391d65eb419642d2e5d57507b1b8546e
 
Red Hat Linux 7.2

SRPMS:
ftp://updates.redhat.com/rhn/public/2703533/pxe/0.1-31.99.7.3/SRPMS/pxe-0.1-31.99.7.3.src.rpm
Missing file
    MD5: fb0aac937bdb8a13cc22a8aa6254cfc7
ftp://updates.redhat.com/rhn/repository/NULL/pxe/0.1-31.99.7.3/SRPMS/pxe-0.1-31.99.7.3.src.rpm
Missing file
    MD5: fb0aac937bdb8a13cc22a8aa6254cfc7
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/pxe/0.1-31.99.7.3/i386/pxe-0.1-31.99.7.3.i386.rpm
Missing file
    MD5: 391d65eb419642d2e5d57507b1b8546e
 
Red Hat Linux 7.3

SRPMS:
ftp://updates.redhat.com/rhn/public/2703533/pxe/0.1-31.99.7.3/SRPMS/pxe-0.1-31.99.7.3.src.rpm
Missing file
    MD5: fb0aac937bdb8a13cc22a8aa6254cfc7
ftp://updates.redhat.com/rhn/repository/NULL/pxe/0.1-31.99.7.3/SRPMS/pxe-0.1-31.99.7.3.src.rpm
Missing file
    MD5: fb0aac937bdb8a13cc22a8aa6254cfc7
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/pxe/0.1-31.99.7.3/i386/pxe-0.1-31.99.7.3.i386.rpm
Missing file
    MD5: 391d65eb419642d2e5d57507b1b8546e
 

Bugs fixed (see bugzilla for more information)

63945 - PXE does not work on servers
66825 - DHCP packets from Cisco VOIP phone crash pxe server


References


Keywords

(VOIP), DHCP, IP, Over, packets, phones, pxe, PXE, Voice


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/