search menu icon-carat-right cmu-wordmark

CERT Coordination Center

ISC DHCP server fails to handle zero-length client identifier

Vulnerability Note VU#541921

Original Release Date: 2010-07-14 | Last Revised: 2010-07-14

Overview

A vulnerability in ISC DHCP could allow a remote attacker to cause the DHCP server to exit, resulting in a denial of service.

Description

ISC DHCP is a commonly redistributed reference implementation of the Dynamic Host Configuration Protocol (DHCP), including a server, client, and relay agent. The server component contains a fencepost error in the way that it handles client identifiers. As a result, a request from a client system containing a zero-length client id will cause the server to exit.

ISC indicates that this vulnerability affects ISC-DHCP versions 4.0.x, 4.1.x, and 4.2.x but not 3.1.x. We are aware of publicly available exploit code for this vulnerability.

Impact

A remote unauthenticated attacker may cause the DHCP server to exit, thereby causing a denial of service.

Solution

Upgrade or apply a patch from the vendor

Patches and updated versions of the software have been released to address this issue. Please see the Systems Affected section of this document for more information.

Users who compile their DHCP software from the original source distribution should upgrade to one of the following versions: 4.1.1-P1 or 4.0.2-P1.

Vendor Information

541921
 

Fedora Project Affected

Updated:  July 14, 2010

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

Internet Systems Consortium Affected

Updated:  July 14, 2010

Statement Date:   May 28, 2010

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

Mandriva S. A. Affected

Updated:  July 14, 2010

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to ISC for reporting this vulnerability.

This document was written by Chad R Dougherty.

Other Information

CVE IDs: CVE-2010-2156
Severity Metric: 5.63
Date Public: 2010-06-01
Date First Published: 2010-07-14
Date Last Updated: 2010-07-14 18:01 UTC
Document Revision: 7

Sponsored by CISA.