ALT-PU-2017-2300-1
Closed vulnerabilities
BDU:2018-00356
Уязвимость сервера ISC DHCP, связанная с переполнением буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании или получить несанкционированный доступ к конфиденциальным данным
Modified: 2025-04-12
CVE-2015-8605
ISC DHCP 4.x before 4.1-ESV-R12-P1, 4.2.x, and 4.3.x before 4.3.3-P1 allows remote attackers to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet.
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175594.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176031.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00162.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00168.html
- http://www.debian.org/security/2016/dsa-3442
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.securityfocus.com/bid/80703
- http://www.securitytracker.com/id/1034657
- http://www.ubuntu.com/usn/USN-2868-1
- https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://kb.isc.org/article/AA-01334
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175594.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176031.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00162.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00168.html
- http://www.debian.org/security/2016/dsa-3442
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.securityfocus.com/bid/80703
- http://www.securitytracker.com/id/1034657
- http://www.ubuntu.com/usn/USN-2868-1
- https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://kb.isc.org/article/AA-01334
Modified: 2025-04-12
CVE-2016-2774
ISC DHCP 4.1.x before 4.1-ESV-R13 and 4.2.x and 4.3.x before 4.3.4 does not restrict the number of concurrent TCP sessions, which allows remote attackers to cause a denial of service (INSIST assertion failure or request-processing outage) by establishing many sessions.
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183458.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183640.html
- http://lists.opensuse.org/opensuse-updates/2016-07/msg00066.html
- http://rhn.redhat.com/errata/RHSA-2016-2590.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/84208
- http://www.securitytracker.com/id/1035196
- https://kb.isc.org/article/AA-01354
- https://lists.debian.org/debian-lts-announce/2019/11/msg00023.html
- https://usn.ubuntu.com/3586-1/
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183458.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183640.html
- http://lists.opensuse.org/opensuse-updates/2016-07/msg00066.html
- http://rhn.redhat.com/errata/RHSA-2016-2590.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/84208
- http://www.securitytracker.com/id/1035196
- https://kb.isc.org/article/AA-01354
- https://lists.debian.org/debian-lts-announce/2019/11/msg00023.html
- https://usn.ubuntu.com/3586-1/
Modified: 2024-11-21
CVE-2018-5732
Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0