First published: Sun Jan 15 2012(Updated: )
The logging functionality in dhcpd in ISC DHCP before 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets related to a lease-status update.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ISC DHCP Client | <=4.2.3 | |
ISC DHCP Client | =3.0 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-beta2 | |
ISC DHCP Client | =3.0-rc1 | |
ISC DHCP Client | =3.0-rc1 | |
ISC DHCP Client | =3.0-rc10 | |
ISC DHCP Client | =3.0-rc11 | |
ISC DHCP Client | =3.0-rc12 | |
ISC DHCP Client | =3.0-rc2 | |
ISC DHCP Client | =3.0-rc2 | |
ISC DHCP Client | =3.0-rc3 | |
ISC DHCP Client | =3.0-rc4 | |
ISC DHCP Client | =3.0-rc5 | |
ISC DHCP Client | =3.0-rc6 | |
ISC DHCP Client | =3.0-rc7 | |
ISC DHCP Client | =3.0-rc8 | |
ISC DHCP Client | =3.0-rc8 | |
ISC DHCP Client | =3.0-rc9 | |
ISC DHCP Client | =3.0.1 | |
ISC DHCP Client | =3.0.1-rc1 | |
ISC DHCP Client | =3.0.1-rc10 | |
ISC DHCP Client | =3.0.1-rc11 | |
ISC DHCP Client | =3.0.1-rc12 | |
ISC DHCP Client | =3.0.1-rc13 | |
ISC DHCP Client | =3.0.1-rc14 | |
ISC DHCP Client | =3.0.1-rc2 | |
ISC DHCP Client | =3.0.1-rc3 | |
ISC DHCP Client | =3.0.1-rc4 | |
ISC DHCP Client | =3.0.1-rc5 | |
ISC DHCP Client | =3.0.1-rc6 | |
ISC DHCP Client | =3.0.1-rc7 | |
ISC DHCP Client | =3.0.1-rc8 | |
ISC DHCP Client | =3.0.1-rc9 | |
ISC DHCP Client | =3.0.2 | |
ISC DHCP Client | =3.0.2-b1 | |
ISC DHCP Client | =3.0.2-rc1 | |
ISC DHCP Client | =3.0.2-rc2 | |
ISC DHCP Client | =3.0.2-rc3 | |
ISC DHCP Client | =3.0.3 | |
ISC DHCP Client | =3.0.3-b1 | |
ISC DHCP Client | =3.0.3-b2 | |
ISC DHCP Client | =3.0.3-b3 | |
ISC DHCP Client | =3.0.4 | |
ISC DHCP Client | =3.0.4-b1 | |
ISC DHCP Client | =3.0.4-b2 | |
ISC DHCP Client | =3.0.4-b3 | |
ISC DHCP Client | =3.0.4-rc1 | |
ISC DHCP Client | =3.0.5 | |
ISC DHCP Client | =3.0.5-rc1 | |
ISC DHCP Client | =3.0.6-rc1 | |
ISC DHCP Client | =3.1.0 | |
ISC DHCP Client | =3.1.0-a1 | |
ISC DHCP Client | =3.1.0-a2 | |
ISC DHCP Client | =3.1.0-a3 | |
ISC DHCP Client | =3.1.0-b1 | |
ISC DHCP Client | =3.1.0-b2 | |
ISC DHCP Client | =4.0.0 | |
ISC DHCP Client | =4.0.0-a1 | |
ISC DHCP Client | =4.0.0-a2 | |
ISC DHCP Client | =4.0.0-a3 | |
ISC DHCP Client | =4.0.0-b1 | |
ISC DHCP Client | =4.0.0-b2 | |
ISC DHCP Client | =4.0.0-b3 | |
ISC DHCP Client | =4.1.0 | |
ISC DHCP Client | =4.1.0-a1 | |
ISC DHCP Client | =4.1.0-a2 | |
ISC DHCP Client | =4.1.0-b1 | |
ISC DHCP Client | =4.2.0 | |
ISC DHCP Client | =4.2.0-a1 | |
ISC DHCP Client | =4.2.0-a2 | |
ISC DHCP Client | =4.2.0-b1 | |
ISC DHCP Client | =4.2.0-b2 | |
ISC DHCP Client | =4.2.0-rc1 | |
ISC DHCP Client | =4.2.1 | |
ISC DHCP Client | =4.2.1-b1 | |
ISC DHCP Client | =4.2.1-rc1 | |
ISC DHCP Client | =4.2.2 | |
ISC DHCP Client | =4.2.2-b1 | |
ISC DHCP Client | =4.2.2-rc1 | |
ISC DHCP Client | =4.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4868 has been classified as a high severity vulnerability due to its potential to cause denial of service.
To fix CVE-2011-4868, upgrade to ISC DHCP version 4.2.3-P2 or later.
CVE-2011-4868 can be exploited by remote attackers using crafted packets to trigger a NULL pointer dereference.
ISC DHCP versions prior to 4.2.3-P2, including versions 3.0 and various 3.0-beta2 versions, are affected.
CVE-2011-4868 can cause the ISC DHCP daemon to crash, leading to service disruptions in network environments.