SB2018030801 - Debian update for isc-dhcp 



SB2018030801 - Debian update for isc-dhcp

Published: March 8, 2018

Security Bulletin ID SB2018030801
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Resource exhaustion (CVE-ID: CVE-2017-3144)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to improper cleaning up of closed OMAPI connections. A remote attacker who is permitted to establish connections to the OMAPI control port can trigger exhaustion of the pool of socket descriptors available to the DHCP server and cause the service to crash.

2) Buffer overflow (CVE-ID: CVE-2018-5732)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the dhclient due to buffer overflow. A remote attacker can send specially crafted response, trigger memory corruption and cause the service to crash.

3) Memory corruption (CVE-ID: CVE-2018-5733)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the dhcpd due to improper handling of reference counting when processing client requests. A remote attacker can send large amounts of data to the target server can send a large number of packets, trigger a reference counter overflow and cause the target dhcpd service to consume all available memory and crash.

Remediation

Install update from vendor's website.