Lucene search

K
freebsdFreeBSDC7FA3618-D5FF-11E1-90A2-000C299B62E1
HistoryJul 24, 2012 - 12:00 a.m.

isc-dhcp -- multiple vulnerabilities

2012-07-2400:00:00
vuxml.freebsd.org
13

6.1 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:N/I:N/A:C

0.223 Low

EPSS

Percentile

96.5%

ISC reports:

An unexpected client identifier parameter can cause the ISC DHCP
daemon to segmentation fault when running in DHCPv6 mode,
resulting in a denial of service to further client requests. In
order to exploit this condition, an attacker must be able to send
requests to the DHCP server.
An error in the handling of malformed client identifiers can cause
a DHCP server running affected versions (see “Impact”) to enter a
state where further client requests are not processed and the
server process loops endlessly, consuming all available CPU
cycles.
Under normal circumstances this condition should not be
triggered, but a non-conforming or malicious client could
deliberately trigger it in a vulnerable server. In order to
exploit this condition an attacker must be able to send requests
to the DHCP server.
Two memory leaks have been found and fixed in ISC DHCP. Both are
reproducible when running in DHCPv6 mode (with the -6 command-line
argument.) The first leak is confirmed to only affect servers
operating in DHCPv6 mode, but based on initial code analysis the
second may theoretically affect DHCPv4 servers (though this has
not been demonstrated.)

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchisc-dhcp41-server< 4.1.e_5,2UNKNOWN
FreeBSDanynoarchisc-dhcp42-server< 4.2.4_1UNKNOWN

6.1 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:N/I:N/A:C

0.223 Low

EPSS

Percentile

96.5%