Format string vulnerabilities in the logging routines for dynamic DNS code (print.c) of ISC DHCP daemon (DHCPD) 3 to 3.0.1rc8, with the NSUPDATE option enabled, allow remote malicious DNS servers to execute arbitrary code via format strings in a DNS server response.
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-028.0.txt
archives.neohapsis.com/archives/vulnwatch/2002-q2/0063.html
distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000483
marc.info/?l=bugtraq&m=102089498828206&w=2
www.cert.org/advisories/CA-2002-12.html
www.iss.net/security_center/static/9039.php
www.kb.cert.org/vuls/id/854315
www.linux-mandrake.com/en/security/2002/MDKSA-2002-037.php
www.novell.com/linux/security/advisories/2002_19_dhcp.html
www.securityfocus.com/bid/4701