ISC DHCP server 4.2 before 4.2.0-P2, when configured to use failover partnerships, allows remote attackers to cause a denial of service (communications-interrupted state and DHCP client service loss) by connecting to a port that is only intended for a failover peer, as demonstrated by a Nagios check_tcp process check to TCP port 520.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052329.html | vendor advisory |
http://secunia.com/advisories/42618 | third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2010/3208 | vdb entry vendor advisory |
http://www.vupen.com/english/advisories/2011/0052 | vdb entry |
https://lists.isc.org/pipermail/dhcp-users/2010-December/012368.html | mailing list |
https://www.isc.org/software/dhcp/advisories/cve-2010-3616 | vendor advisory |
http://www.kb.cert.org/vuls/id/159528 | third party advisory us government resource |
http://www.securitytracker.com/id?1024862 | vdb entry |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:001 | vendor advisory |
http://www.securityfocus.com/bid/45360 | vdb entry |
http://secunia.com/advisories/42682 | third party advisory |