ISC Security Advisory: An Error in the Handling of an Unexpected Client Identifiers can Cause Server Crash When Serving DHCPv6
Cathy Almond
cathya at isc.org
Tue Jul 24 17:54:40 UTC 2012
Note: This email advisory is provided for your information. The most up
to date advisory information will always be at:
https://kb.isc.org/article/AA-00714
please use this URL for the most up to date advisory information.
Title: An error in the handling of an unexpected client identifiers can
cause a server crash when serving DHCPv6.
CVE: CVE-2012-3570
Document Version: 2.0
Posting date: 24 Jul 2012
Program Impacted: DHCP
Versions affected: 4.2.0 --> 4.2.4
Severity: High
Exploitable: From adjacent networks
Description:
An unexpected client identifier parameter can cause the ISC DHCP daemon
to segmentation fault when running in DHCPv6 mode, resulting in a denial
of service to further client requests.
In order to exploit this condition, an attacker must be able to send
requests to the DHCP server.
Impact:
Causes the server process to crash when a buffer overflows, resulting in
a denial of service. NOTE: DHCP versions 4.0 -->4.1.x are NOT impacted.
CVSS Score: 6.1
CVSS Equation: (AV:A/AC:L/Au:N/C:N/I:N/A:C)
For more information on the Common Vulnerability Scoring System and to
obtain your specific environmental score please visit
http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2&vector=(AV:A/AC:L/Au:N/C:N/I:N/A:C)
Workarounds:
None.
Active exploits:
None known at this time.
Solution:
Upgrade affected systems to DHCP 4.2.4-P1
DHCP 4.2.4-P1 is available from www.isc.org/downloads/all
Acknowledgment:
Markus Hietava of Codenomicon CROSS project for finding the
vulnerability, and CERT-FI for vulnerability coordination.
Document Revision History:
1.0 - 03 July 2012 - Phase I notified
1.1 - 13 July 2012 HOLD notice sent to Phase 1 regarding new CVE
being added and new public release date
1.2 - 23 July 2012 Phase 2 & 3 notified
2.0 - 24 July 2012 Phase 4-Public release
References:
Do you have Questions? Questions regarding this advisory should go
to security-officer at isc.org.
ISC Security Vulnerability Disclosure Policy: Details of our current
security advisory policy and practice can be found here:
https://www.isc.org/security-vulnerability-disclosure-policy
German Translation: https://kb.isc.org/article/AA-00740
Spanish Translation: https://kb.isc.org/article/AA-00745
Japanese Translation: https://kb.isc.org/article/AA-00756
This security advisory is also located in our KnowledgeBase:
https://kb.isc.org/Article/AA-00714
Note: ISC patches only Currently supported versions. When possible we
indicate EOL versions affected.
If you'd like more information on our Forum or BIND/DHCP support please
visit www.isc.org/software/guild or www.isc.org/support
Legal Disclaimer:
Internet Systems Consortium (ISC) is providing this notice on an "AS IS"
basis. No warranty or guarantee of any kind is expressed in this notice
and none should be implied. ISC expressly excludes and disclaims any
warranties regarding this notice or materials referred to in this
notice, including, without limitation, any implied warranty of
merchantability, fitness for a particular purpose, absence of hidden
defects, or of non-infringement. Your use or reliance on this notice or
materials referred to in this notice is at your own risk. ISC may change
this notice at any time.
A stand-alone copy or paraphrase of the text of this document that omits
the document URL is an uncontrolled copy. Uncontrolled copies may lack
important information, be out of date, or contain factual errors.
More information about the dhcp-workers
mailing list