Lucene search

K
certCERTVU:159528
HistoryDec 13, 2010 - 12:00 a.m.

ISC DHCP server vulnerability

2010-12-1300:00:00
www.kb.cert.org
22

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.116 Low

EPSS

Percentile

95.2%

Overview

The ISC DHCP server contains a vulnerability that could allow a remote attacker to cause a denial of service.

Description

According to ISC:

If a TCP connection is established to the server on a port which has been configured for communication with a failover peer, this can cause it to become non-responsive to all normal DHCP protocol traffic. The server will progress to a communications-interrupted state - but in addition will also cease to provide DHCP services to clients. The server must be restarted to resume normal operation.
This can be used as an attack vector against servers that are configured for failover partnerships.


Impact

An unauthenticated remote attacker could cause the server to become unresponsive to all normal DHCP protocol traffic, thereby creating a denial of service.


Solution

Apply an update

Users who obtain ISC DHCP from a third-party vendor, such as their operating system vendor, should see the vendor information portion of this document for a partial list of affected vendors.

This vulnerability is addressed in ISC DHCP version 4.2.0-P2. Users of ISC DHCP from the original source distribution should upgrade to this version or later, as appropriate.

See also <https://www.isc.org/software/dhcp/advisories/cve-2010-3616&gt;


Vendor Information

159528

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Internet Systems Consortium - DHCP Affected

Updated: December 13, 2010

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

<https://www.isc.org/software/dhcp/advisories/cve-2010-3616&gt;

Acknowledgements

Thanks to Internet Systems Consortium for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

CVE IDs: CVE-2010-3616
Severity Metric: 11.81 Date Public:

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.116 Low

EPSS

Percentile

95.2%