First published: Wed Dec 06 2017(Updated: )
A vulnerability stemming from failure to properly clean up closed OMAPI connections can lead to exhaustion of the pool of socket descriptors available to the DHCP server. Affects ISC DHCP 4.1.0 to 4.1-ESV-R15, 4.2.0 to 4.2.8, 4.3.0 to 4.3.6. Older versions may also be affected but are well beyond their end-of-life (EOL). Releases prior to 4.1.0 have not been tested.
Credit: security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/isc-dhcp | <=4.2.2.dfsg.1-5+deb70u8<=4.3.1-6 | 4.3.5-3.1 4.3.5-3+deb9u1 4.3.1-6+deb8u3 |
debian/isc-dhcp | 4.4.1-2.3+deb11u2 4.4.1-2.3+deb11u1 4.4.3-P1-2 4.4.3-P1-5 | |
ISC DHCP Server | >=4.2.0<=4.2.8 | |
ISC DHCP Server | >=4.3.0<=4.3.6 | |
ISC DHCP Server | =4.1-esv | |
ISC DHCP Server | =4.1-esv-r1 | |
ISC DHCP Server | =4.1-esv-r10 | |
ISC DHCP Server | =4.1-esv-r10_b1 | |
ISC DHCP Server | =4.1-esv-r10_rc1 | |
ISC DHCP Server | =4.1-esv-r11 | |
ISC DHCP Server | =4.1-esv-r11_b1 | |
ISC DHCP Server | =4.1-esv-r11_rc1 | |
ISC DHCP Server | =4.1-esv-r11_rc2 | |
ISC DHCP Server | =4.1-esv-r12 | |
ISC DHCP Server | =4.1-esv-r12_b1 | |
ISC DHCP Server | =4.1-esv-r12_p1 | |
ISC DHCP Server | =4.1-esv-r13 | |
ISC DHCP Server | =4.1-esv-r13_b1 | |
ISC DHCP Server | =4.1-esv-r14 | |
ISC DHCP Server | =4.1-esv-r14_b1 | |
ISC DHCP Server | =4.1-esv-r15 | |
ISC DHCP Server | =4.1-esv-r2 | |
ISC DHCP Server | =4.1-esv-r3 | |
ISC DHCP Server | =4.1-esv-r3_b1 | |
ISC DHCP Server | =4.1-esv-r4 | |
ISC DHCP Server | =4.1-esv-r5 | |
ISC DHCP Server | =4.1-esv-r5_b1 | |
ISC DHCP Server | =4.1-esv-r5_rc1 | |
ISC DHCP Server | =4.1-esv-r5_rc2 | |
ISC DHCP Server | =4.1-esv-r6 | |
ISC DHCP Server | =4.1-esv-r7 | |
ISC DHCP Server | =4.1-esv-r8 | |
ISC DHCP Server | =4.1-esv-r8_b1 | |
ISC DHCP Server | =4.1-esv-r8_rc1 | |
ISC DHCP Server | =4.1-esv-r9 | |
ISC DHCP Server | =4.1-esv-r9_b1 | |
ISC DHCP Server | =4.1-esv-r9_rc1 | |
ISC DHCP Server | =4.1.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server eus | =7.4 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server tus | =7.4 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux workstation | =7.0 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =17.10 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3144 is classified as a medium severity vulnerability due to its potential to exhaust socket descriptors.
To mitigate CVE-2017-3144, upgrade ISC DHCP to version 4.4 or later or apply vendor patches as specified.
CVE-2017-3144 affects ISC DHCP versions 4.1.0 to 4.1-ESV-R15, 4.2.0 to 4.2.8, and 4.3.0 to 4.3.6.
CVE-2017-3144 is caused by the failure to properly clean up closed OMAPI connections, leading to resource exhaustion.
Yes, older versions of ISC DHCP may also be vulnerable to CVE-2017-3144, although they are not explicitly listed.