5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.116 Low
EPSS
Percentile
95.2%
The ISC DHCP server contains a vulnerability that could allow a remote attacker to cause a denial of service.
According to ISC:
If a TCP connection is established to the server on a port which has been configured for communication with a failover peer, this can cause it to become non-responsive to all normal DHCP protocol traffic. The server will progress to a communications-interrupted state - but in addition will also cease to provide DHCP services to clients. The server must be restarted to resume normal operation.
This can be used as an attack vector against servers that are configured for failover partnerships.
An unauthenticated remote attacker could cause the server to become unresponsive to all normal DHCP protocol traffic, thereby creating a denial of service.
Apply an update
Users who obtain ISC DHCP from a third-party vendor, such as their operating system vendor, should see the vendor information portion of this document for a partial list of affected vendors.
This vulnerability is addressed in ISC DHCP version 4.2.0-P2. Users of ISC DHCP from the original source distribution should upgrade to this version or later, as appropriate.
See also <https://www.isc.org/software/dhcp/advisories/cve-2010-3616>
159528
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: December 13, 2010
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
<https://www.isc.org/software/dhcp/advisories/cve-2010-3616>
Thanks to Internet Systems Consortium for reporting this vulnerability.
This document was written by Michael Orlando.
CVE IDs: | CVE-2010-3616 |
---|---|
Severity Metric: | 11.81 Date Public: |