Lucene search

K
nvd[email protected]NVD:CVE-2017-3144
HistoryJan 16, 2019 - 8:29 p.m.

CVE-2017-3144

2019-01-1620:29:00
CWE-400
web.nvd.nist.gov
1

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.2 Medium

AI Score

Confidence

High

0.144 Low

EPSS

Percentile

95.8%

A vulnerability stemming from failure to properly clean up closed OMAPI connections can lead to exhaustion of the pool of socket descriptors available to the DHCP server. Affects ISC DHCP 4.1.0 to 4.1-ESV-R15, 4.2.0 to 4.2.8, 4.3.0 to 4.3.6. Older versions may also be affected but are well beyond their end-of-life (EOL). Releases prior to 4.1.0 have not been tested.

Affected configurations

NVD
Node
iscdhcpRange4.2.04.2.8
OR
iscdhcpRange4.3.04.3.6
OR
iscdhcpMatch4.1-esv-
OR
iscdhcpMatch4.1-esvr1
OR
iscdhcpMatch4.1-esvr10
OR
iscdhcpMatch4.1-esvr10_b1
OR
iscdhcpMatch4.1-esvr10_rc1
OR
iscdhcpMatch4.1-esvr11
OR
iscdhcpMatch4.1-esvr11_b1
OR
iscdhcpMatch4.1-esvr11_rc1
OR
iscdhcpMatch4.1-esvr11_rc2
OR
iscdhcpMatch4.1-esvr12
OR
iscdhcpMatch4.1-esvr12_b1
OR
iscdhcpMatch4.1-esvr12_p1
OR
iscdhcpMatch4.1-esvr13
OR
iscdhcpMatch4.1-esvr13_b1
OR
iscdhcpMatch4.1-esvr14
OR
iscdhcpMatch4.1-esvr14_b1
OR
iscdhcpMatch4.1-esvr15
OR
iscdhcpMatch4.1-esvr2
OR
iscdhcpMatch4.1-esvr3
OR
iscdhcpMatch4.1-esvr3_b1
OR
iscdhcpMatch4.1-esvr4
OR
iscdhcpMatch4.1-esvr5
OR
iscdhcpMatch4.1-esvr5_b1
OR
iscdhcpMatch4.1-esvr5_rc1
OR
iscdhcpMatch4.1-esvr5_rc2
OR
iscdhcpMatch4.1-esvr6
OR
iscdhcpMatch4.1-esvr7
OR
iscdhcpMatch4.1-esvr8
OR
iscdhcpMatch4.1-esvr8_b1
OR
iscdhcpMatch4.1-esvr8_rc1
OR
iscdhcpMatch4.1-esvr9
OR
iscdhcpMatch4.1-esvr9_b1
OR
iscdhcpMatch4.1-esvr9_rc1
OR
iscdhcpMatch4.1.0
Node
redhatenterprise_linux_desktopMatch7.0
OR
redhatenterprise_linux_serverMatch7.0
OR
redhatenterprise_linux_server_ausMatch7.4
OR
redhatenterprise_linux_server_ausMatch7.6
OR
redhatenterprise_linux_server_eusMatch7.4
OR
redhatenterprise_linux_server_eusMatch7.5
OR
redhatenterprise_linux_server_eusMatch7.6
OR
redhatenterprise_linux_server_tusMatch7.4
OR
redhatenterprise_linux_server_tusMatch7.6
OR
redhatenterprise_linux_workstationMatch7.0
Node
canonicalubuntu_linuxMatch14.04lts
OR
canonicalubuntu_linuxMatch16.04lts
OR
canonicalubuntu_linuxMatch17.10
Node
debiandebian_linuxMatch8.0
OR
debiandebian_linuxMatch9.0

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.2 Medium

AI Score

Confidence

High

0.144 Low

EPSS

Percentile

95.8%