Overview
A vulnerability in ISC DHCP could allow a remote attacker to cause the DHCP server to exit, resulting in a denial of service.
Description
ISC DHCP is a commonly redistributed reference implementation of the Dynamic Host Configuration Protocol (DHCP), including a server, client, and relay agent. The server component contains a fencepost error in the way that it handles client identifiers. As a result, a request from a client system containing a zero-length client id will cause the server to exit. ISC indicates that this vulnerability affects ISC-DHCP versions 4.0.x, 4.1.x, and 4.2.x but not 3.1.x. We are aware of publicly available exploit code for this vulnerability. |
Impact
A remote unauthenticated attacker may cause the DHCP server to exit, thereby causing a denial of service. |
Solution
Upgrade or apply a patch from the vendor Patches and updated versions of the software have been released to address this issue. Please see the Systems Affected section of this document for more information. Users who compile their DHCP software from the original source distribution should upgrade to one of the following versions: 4.1.1-P1 or 4.0.2-P1. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to ISC for reporting this vulnerability.
This document was written by Chad R Dougherty.
Other Information
CVE IDs: | CVE-2010-2156 |
Severity Metric: | 5.63 |
Date Public: | 2010-06-01 |
Date First Published: | 2010-07-14 |
Date Last Updated: | 2010-07-14 18:01 UTC |
Document Revision: | 7 |