First published: Tue Nov 02 2010(Updated: )
ISC DHCP server 4.0 before 4.0.2, 4.1 before 4.1.2, and 4.2 before 4.2.0-P1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a DHCPv6 packet containing a Relay-Forward message without an address in the Relay-Forward link-address field.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
ISC DHCP | =4.1.0 | |
ISC DHCP | =4.1.1-rc1 | |
ISC DHCP | =4.2.0-b2 | |
ISC DHCP | =4.2.0-a2 | |
ISC DHCP | =4.0.1 | |
ISC DHCP | =4.1.1-b2 | |
ISC DHCP | =4.0.1-rc1 | |
ISC DHCP | =4.2.0-b1 | |
ISC DHCP | =4.2.0-a1 | |
ISC DHCP | =4.0.1-b1 | |
ISC DHCP | =4.2.0 | |
ISC DHCP | =4.1.1 | |
ISC DHCP | =4.0.0 | |
ISC DHCP | =4.1.1-b3 | |
ISC DHCP | =4.1.1-b1 | |
ISC DHCP | =4.2.0-rc1 | |
ISC DHCP | =4.0 | |
redhat/dhcp | <12:4.1.1-12.P1.el6_0.1 | 12:4.1.1-12.P1.el6_0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.