Vulnerability identifier: #VU10031
Vulnerability risk: Low
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-400
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
DHCP
Server applications /
Other server solutions
Vendor: ISC
Description
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to improper cleaning up of closed OMAPI connections. A remote attacker who is permitted to establish connections to the OMAPI control port can trigger exhaustion of the pool of socket descriptors available to the DHCP server and cause the service to crash.
Mitigation
The recommended remedy is to disallow access to the OMAPI control port from unauthorized clients (in accordance with best practices for server operation).
Vulnerable software versions
DHCP: 4.1-ESV-R15 - 4.1.0, 4.2.0 - 4.2.8, 4.3.0 - 4.3.6
External links
https://kb.isc.org/article/AA-01541
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.