7.8
CWE
20
Advisory Published
CVE Published
Updated

CVE-2011-2748: Input Validation

First published: Tue Aug 09 2011(Updated: )

The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
ISC DHCP=4.0.2-b2
ISC DHCP=4.1-esv-r3_b1
ISC DHCP=3.0.4-b2
ISC DHCP=3.1.0-b1
ISC DHCP=3.1.0-a3
ISC DHCP=4.1-esv-r3
ISC DHCP=4.1.0
ISC DHCP=3.0.6-rc1
ISC DHCP=4.0.2-b3
ISC DHCP=4.1-esv-r2
ISC DHCP=3.1.2-rc1
ISC DHCP=4.1.1-rc1
ISC DHCP=4.2.0-b2
ISC DHCP=3.1.0-rc1
ISC DHCP=3.0.4-b1
ISC DHCP=4.0.2-b1
ISC DHCP=3.1.0-a1
ISC DHCP=3.0.1-rc12
ISC DHCP=3.0
ISC DHCP=3.0.2-b1
ISC DHCP=3.0.3-b1
ISC DHCP=4.2.0-a2
ISC DHCP=4.1.1-b2
ISC DHCP=3.0.1-rc1
ISC DHCP=3.0.4-b3
ISC DHCP=3.0.2-rc1
ISC DHCP=4.0.1-rc1
ISC DHCP=4.2.0-b1
ISC DHCP=4.2.1-rc1
ISC DHCP=3.0.1-rc7
ISC DHCP=3.1-esv
ISC DHCP=3.0.2-rc3
ISC DHCP=4.2.0-a1
ISC DHCP=3.0.1-rc2
ISC DHCP=4.0.1-b1
ISC DHCP=3.1.3-b1
ISC DHCP=3.0.1-rc14
ISC DHCP=4.0.2-rc1
ISC DHCP=3.0.1-rc6
ISC DHCP=3.0.2-rc2
ISC DHCP=3.0.1-rc13
ISC DHCP=4.0.3-rc1
ISC DHCP=3.0.1-rc9
ISC DHCP=3.0.3-b3
ISC DHCP=3.1.1-rc1
ISC DHCP=3.1.0-a2
ISC DHCP=3.0.1-rc8
ISC DHCP=4.0.0
ISC DHCP=3.0.3-b2
ISC DHCP=4.1.1-b3
ISC DHCP=3.1
ISC DHCP=4.0.3-b1
ISC DHCP=4.1-esv-r1
ISC DHCP=4.1.1-b1
ISC DHCP=4.1-esv-rc1
ISC DHCP=3.1.2-b1
ISC DHCP=4.2.1-b1
ISC DHCP=4.2.0-rc1
ISC DHCP=3.1.3-rc1
ISC DHCP=4.0
ISC DHCP=3.0.1-rc10
ISC DHCP=4.0-esv
ISC DHCP=4.2.0-p1
ISC DHCP=3.0.5-rc1
ISC DHCP=3.0.1-rc11
ISC DHCP=3.1.1-rc2
ISC DHCP=3.0.4-rc1
ISC DHCP=3.1.0-b2
ISC DHCP=3.0.1-rc5
ISC DHCP=4.1.2
ISC DHCP=3.0.1
ISC DHCP=3.0.2
ISC DHCP=3.0.4
ISC DHCP=3.0.5
ISC DHCP=3.1.0
ISC DHCP=3.1.1
ISC DHCP=3.1.2
ISC DHCP=3.1.3
ISC DHCP=4.0.1
ISC DHCP=4.0.2
ISC DHCP=4.0.3
ISC DHCP=4.1-esv
ISC DHCP=4.1.1
ISC DHCP=4.2.0
ISC DHCP=4.2.1
Ubuntu=10.10
Ubuntu=11.04
Ubuntu=8.04
Ubuntu=10.04
Debian Linux=5.0
Debian Linux=7.0
Debian Linux=6.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2011-2748?

    CVE-2011-2748 is classified as a denial of service vulnerability affecting various versions of the ISC DHCP server.

  • How do I fix CVE-2011-2748?

    To fix CVE-2011-2748, upgrade to ISC DHCP version 4.2.2 or later, or apply any relevant patches provided by your Linux distribution.

  • Which versions of ISC DHCP are affected by CVE-2011-2748?

    CVE-2011-2748 affects ISC DHCP versions 3.x and 4.x prior to 4.2.2, including several specific ESV and RC versions.

  • Can CVE-2011-2748 be exploited remotely?

    Yes, CVE-2011-2748 can be exploited remotely through specially crafted DHCP packets, potentially leading to server crashes.

  • What are the implications of CVE-2011-2748 for users?

    The implications of CVE-2011-2748 for users include outages due to the DHCP server exiting unexpectedly, disrupting network services.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203