How can I solve This?

K

KMILO

Internet Software Consortium (ISC) Dynamic Host
Configuration Protocol (DHCP) daemon versions 3 through
3.0.1rc8 are vulnerable to a format string attack that
could allow a remote attacker to gain root privileges on
the system. The NSUPDATE option that is installed with
DHCPD by default returns a DNS (Domain Name System) update
request after processing a DHCP request. Once the request
is received by the DNS server, a response is returned,
which is logged by the DHCP server. A remote attacker
could supply a malicious format string as part of the
hostname in the DNS response, which could allow the
attacker to execute arbitrary code on the system with root
privileges, once the response is logged
 
R

Roger Abell

Perhaps you would entertain using the MS DNS server
and the DHCP client that is built into all recent versions
of Windows ??
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top