ALT-PU-2018-1300-1
Closed vulnerabilities
BDU:2018-00356
Уязвимость сервера ISC DHCP, связанная с переполнением буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании или получить несанкционированный доступ к конфиденциальным данным
BDU:2018-00357
Уязвимость DHCP-сервера dhcpd, вызванная возможностью переполнения 32-разрядного счетчика ссылок и позволяющая вызвать отказ в обслуживании сервера
Modified: 2024-11-21
CVE-2017-3144
A vulnerability stemming from failure to properly clean up closed OMAPI connections can lead to exhaustion of the pool of socket descriptors available to the DHCP server. Affects ISC DHCP 4.1.0 to 4.1-ESV-R15, 4.2.0 to 4.2.8, 4.3.0 to 4.3.6. Older versions may also be affected but are well beyond their end-of-life (EOL). Releases prior to 4.1.0 have not been tested.
Modified: 2024-11-21
CVE-2018-5732
Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0
Modified: 2024-11-21
CVE-2018-5733
A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0.
- 103188
- 103188
- 1040437
- 1040437
- RHSA-2018:0469
- RHSA-2018:0469
- RHSA-2018:0483
- RHSA-2018:0483
- https://kb.isc.org/docs/aa-01567
- https://kb.isc.org/docs/aa-01567
- [debian-lts-announce] 20180322 [SECURITY] [DLA 1313-1] isc-dhcp security update
- [debian-lts-announce] 20180322 [SECURITY] [DLA 1313-1] isc-dhcp security update
- USN-3586-1
- USN-3586-1
- USN-3586-2
- USN-3586-2
- DSA-4133
- DSA-4133