Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    ISC dhcpd vulnerability

    Scheduled Pinned Locked Moved 2.1 Snapshot Feedback and Problems - RETIRED
    4 Posts 2 Posters 1.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      dhatz
      last edited by

      http://www.vuxml.org/freebsd/c7fa3618-d5ff-11e1-90a2-000c299b62e1.html

      isc-dhcp – multiple vulnerabilities

      Affected packages
      isc-dhcp42-server < 4.2.4_1

      Details
      VuXML ID c7fa3618-d5ff-11e1-90a2-000c299b62e1
      Discovery 2012-07-24
      Entry 2012-07-25

      ISC reports:

      An unexpected client identifier parameter can cause the ISC DHCP daemon to segmentation fault when running in DHCPv6 mode, resulting in a denial of service to further client requests. In order to exploit this condition, an attacker must be able to send requests to the DHCP server.

      An error in the handling of malformed client identifiers can cause a DHCP server running affected versions (see "Impact") to enter a state where further client requests are not processed and the server process loops endlessly, consuming all available CPU cycles. Under normal circumstances this condition should not be triggered, but a non-conforming or malicious client could deliberately trigger it in a vulnerable server. In order to exploit this condition an attacker must be able to send requests to the DHCP server.

      Two memory leaks have been found and fixed in ISC DHCP. Both are reproducible when running in DHCPv6 mode (with the -6 command-line argument.) The first leak is confirmed to only affect servers operating in DHCPv6 mode, but based on initial code analysis the second may theoretically affect DHCPv4 servers (though this has not been demonstrated.)

      1 Reply Last reply Reply Quote 0
      • jimpJ
        jimp Rebel Alliance Developer Netgate
        last edited by

        Should be up-to-date on new snaps.

        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        1 Reply Last reply Reply Quote 0
        • D
          dhatz
          last edited by

          There was a new ISC dhcpd vulnerability announced a few days ago:

          http://www.isc.org/advisories/dhcp

          Reducing the Expiration Time for an IPv6 Lease May Cause the Server to Crash

          ISC has discovered that reducing the expiration time for an active IPv6 lease may cause the server to crash.
          CVE: CVE-2012-3955
          Document Version:  2.0
          Posting date: 12 Sep 2012
          Program Impacted: DHCP
          Versions affected:  4.1.x, 4.2.x
          Severity:  Medium
          Exploitable:  Remotel

          Ports have been upgraded to 4.2.4-P2 http://www.freshports.org/net/isc-dhcp42-server/

          1 Reply Last reply Reply Quote 0
          • jimpJ
            jimp Rebel Alliance Developer Netgate
            last edited by

            I bumped it on 2.1, no need to address that for 2.0.2 since it only applies to IPv6

            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

            Need help fast? Netgate Global Support!

            Do not Chat/PM for help!

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.