|Check Point Reference:||CPAI-2011-377|
|Date Published:||16 Aug 2011|
|Last Updated:||22 Feb 2017|
|Protection Provided by:||
|Who is Vulnerable?|
|Vulnerability Description||A command injection vulnerability has been reported in ISC DHCP dhclient. The Dynamic Host Configuration Protocol (DHCP) protocol is used to centrally manage and automate IP addresses assignment on a network.The vulnerability is due to an input validation issue in dhclient when parsing crafted responses from a DHCP server. A remote attacker could trigger this vulnerability by sending such responses to an affected service.Successful exploitation may allow an attacker to execute commands on an affected system, in the security context of the 'root' user.|
This protection detects attempts to transfer malicious DHCP responses to the network.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update.For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: DHCP Protection Violation.
Attack Information: ISC DHCP dhclient Network Configuration Script Command Injection