First published: Fri Feb 07 2003(Updated: )
ISC dhcrelay (dhcp-relay) 3.0rc9 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (packet storm) via a certain BOOTP packet that is forwarded to a broadcast MAC address, causing an infinite loop that is not restricted by a hop count.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ISC DHCP | =3.0.1-rc9 | |
ISC DHCP | =3.0.1-rc4 | |
ISC DHCP | =3.0.1-rc5 | |
ISC DHCP | =3.0.1-rc1 | |
ISC DHCP | =3.0.1-rc10 | |
ISC DHCP | =3.0.1-rc8 | |
ISC DHCP | =3.0.1-rc3 | |
ISC DHCP | =3.0.1-rc6 | |
ISC DHCP | =3.0.1-rc2 | |
ISC DHCP | =3.0.1-rc7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0039 is classified as a denial of service vulnerability that can result in significant service disruption.
To fix CVE-2003-0039, it is recommended to upgrade to a later version of ISC dhcrelay that does not exhibit this vulnerability.
The affected versions of ISC dhcrelay include 3.0.1-rc1 through 3.0.1-rc10.
CVE-2003-0039 involves an infinite loop caused by BOOTP packets forwarded to a broadcast MAC address, leading to a packet storm.
Any organization using ISC dhcrelay 3.0.1-rc1 to 3.0.1-rc10 is vulnerable to the denial of service conditions described in CVE-2003-0039.