ISC Security Advisory: An Error in the Handling of an Unexpected Client Identifiers can Cause Server Crash When Serving DHCPv6

Cathy Almond cathya at isc.org
Tue Jul 24 17:51:15 UTC 2012


Note: This email advisory is provided for your information. The most up
to date advisory information will always be at:
https://kb.isc.org/article/AA-00714
please use this URL for the most up to date advisory information.

Title:  An error in the handling of an unexpected client identifiers can
cause a server crash when serving DHCPv6.
CVE:                       CVE-2012-3570
Document Version:          2.0
Posting date:              24 Jul 2012
Program Impacted:          DHCP
Versions affected:         4.2.0 --> 4.2.4
Severity:                  High
Exploitable:          From adjacent networks

Description:

An unexpected client identifier parameter can cause the ISC DHCP daemon
to segmentation fault when running in DHCPv6 mode, resulting in a denial
of service to further client requests.

In order to exploit this condition, an attacker must be able to send
requests to the DHCP server.

Impact:

Causes the server process to crash when a buffer overflows, resulting in
a denial of service.  NOTE: DHCP versions 4.0 -->4.1.x are NOT impacted.

CVSS Score: 6.1

CVSS Equation:  (AV:A/AC:L/Au:N/C:N/I:N/A:C)
For more information on the Common Vulnerability Scoring System and to
obtain your specific environmental score please visit
http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2&vector=(AV:A/AC:L/Au:N/C:N/I:N/A:C)
Workarounds:

None.
Active exploits:

None known at this time.

Solution:
Upgrade affected systems to DHCP 4.2.4-P1

DHCP 4.2.4-P1 is available from www.isc.org/downloads/all

Acknowledgment:
Markus Hietava of Codenomicon CROSS project for finding the
vulnerability, and CERT-FI for vulnerability coordination.

Document Revision History:

    1.0 - 03 July 2012 - Phase I notified
    1.1 - 13 July 2012 HOLD notice sent to Phase 1 regarding new CVE
being added and new public release date
    1.2 - 23 July 2012 Phase 2 & 3 notified
    2.0 - 24 July 2012 Phase 4-Public release

References:

    Do you have Questions? Questions regarding this advisory should go
to security-officer at isc.org.
    ISC Security Vulnerability Disclosure Policy: Details of our current
security advisory policy and practice can be found here:
https://www.isc.org/security-vulnerability-disclosure-policy
    German Translation:  https://kb.isc.org/article/AA-00740
    Spanish Translation:  https://kb.isc.org/article/AA-00745
    Japanese Translation: https://kb.isc.org/article/AA-00756

This security advisory is also located in our KnowledgeBase:
https://kb.isc.org/Article/AA-00714

Note: ISC patches only Currently supported versions. When possible we
indicate EOL versions affected.

If you'd like more information on our Forum or BIND/DHCP support please
visit www.isc.org/software/guild or www.isc.org/support

Legal Disclaimer:

Internet Systems Consortium (ISC) is providing this notice on an "AS IS"
basis. No warranty or guarantee of any kind is expressed in this notice
and none should be implied. ISC expressly excludes and disclaims any
warranties regarding this notice or materials referred to in this
notice, including, without limitation, any implied warranty of
merchantability, fitness for a particular purpose, absence of hidden
defects, or of non-infringement. Your use or reliance on this notice or
materials referred to in this notice is at your own risk. ISC may change
this notice at any time.

A stand-alone copy or paraphrase of the text of this document that omits
the document URL is an uncontrolled copy. Uncontrolled copies may lack
important information, be out of date, or contain factual errors.


More information about the dhcp-announce mailing list