Executive Summary
Summary | |
---|---|
Title | isc-dhcp security update |
Informations | |||
---|---|---|---|
Name | DSA-4133 | First vendor Publication | 2018-03-07 |
Vendor | Debian | Last vendor Modification | 2018-03-07 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several vulnerabilities have been discovered in the ISC DHCP client, relay and server. The Common Vulnerabilities and Exposures project identifies the following issues: CVE-2017-3144 It was discovered that the DHCP server does not properly clean up closed OMAPI connections, which can lead to exhaustion of the pool of socket descriptors available to the DHCP server, resulting in denial of service. CVE-2018-5732 Felix Wilhelm of the Google Security Team discovered that the DHCP client is prone to an out-of-bound memory access vulnerability when processing specially constructed DHCP options responses, resulting in potential execution of arbitrary code by a malicious DHCP server. CVE-2018-5733 Felix Wilhelm of the Google Security Team discovered that the DHCP server does not properly handle reference counting when processing client requests. A malicious client can take advantage of this flaw to cause a denial of service (dhcpd crash) by sending large amounts of traffic. For the oldstable distribution (jessie), these problems have been fixed in version 4.3.1-6+deb8u3. For the stable distribution (stretch), these problems have been fixed in version 4.3.5-3+deb9u1. We recommend that you upgrade your isc-dhcp packages. For the detailed security status of isc-dhcp please refer to its security tracker page at: https://security-tracker.debian.org/tracker/isc-dhcp |
Original Source
Url : http://www.debian.org/security/2018/dsa-4133 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
33 % | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
33 % | CWE-190 | Integer Overflow or Wraparound (CWE/SANS Top 25) |
33 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2018-02-20 | ISC DHCPD remote denial of service attempt RuleID : 45499 - Revision : 4 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2018-11-02 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL08306700.nasl - Type : ACT_GATHER_INFO |
2018-09-18 | Name : The remote EulerOS Virtualization host is missing multiple security updates. File : EulerOS_SA-2018-1250.nasl - Type : ACT_GATHER_INFO |
2018-09-18 | Name : The remote EulerOS Virtualization host is missing a security update. File : EulerOS_SA-2018-1241.nasl - Type : ACT_GATHER_INFO |
2018-05-02 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2018-1073.nasl - Type : ACT_GATHER_INFO |
2018-05-02 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2018-1072.nasl - Type : ACT_GATHER_INFO |
2018-04-18 | Name : The remote Amazon Linux 2 host is missing a security update. File : al2_ALAS-2018-984.nasl - Type : ACT_GATHER_INFO |
2018-04-18 | Name : The remote Amazon Linux 2 host is missing a security update. File : al2_ALAS-2018-963.nasl - Type : ACT_GATHER_INFO |
2018-04-10 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201804-05.nasl - Type : ACT_GATHER_INFO |
2018-04-06 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2018-984.nasl - Type : ACT_GATHER_INFO |
2018-03-23 | Name : The remote Debian host is missing a security update. File : debian_DLA-1313.nasl - Type : ACT_GATHER_INFO |
2018-03-15 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-0483.nasl - Type : ACT_GATHER_INFO |
2018-03-12 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-0469.nasl - Type : ACT_GATHER_INFO |
2018-03-08 | Name : The DHCP server installed on the remote Linux host is affected by a buffer ov... File : isc_dhcp_AA-01565_AA-01567.nasl - Type : ACT_GATHER_INFO |
2018-03-08 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-4133.nasl - Type : ACT_GATHER_INFO |
2018-03-06 | Name : The remote Fedora host is missing a security update. File : fedora_2018-5051dbd15e.nasl - Type : ACT_GATHER_INFO |
2018-03-05 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_2040c7f51e3a11e88ae90050569f0b83.nasl - Type : ACT_GATHER_INFO |
2018-03-02 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2018-060-01.nasl - Type : ACT_GATHER_INFO |
2018-02-13 | Name : The remote EulerOS host is missing a security update. File : EulerOS_SA-2018-1036.nasl - Type : ACT_GATHER_INFO |
2018-02-13 | Name : The remote EulerOS host is missing a security update. File : EulerOS_SA-2018-1035.nasl - Type : ACT_GATHER_INFO |
2018-01-26 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-0158.nasl - Type : ACT_GATHER_INFO |
2018-01-19 | Name : The DHCP server installed on the remote Linux host is affected by a denial of... File : isc_dhcp_AA-01541.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2019-10-10 05:24:05 |
|
2019-02-08 00:21:51 |
|
2019-01-17 17:21:10 |
|
2018-03-08 00:19:29 |
|