First published: Fri May 21 2021(Updated: )
A flaw was found in the Dynamic Host Configuration Protocol (DHCP). There is a discrepancy between the code that handles encapsulated option information in leases transmitted "on the wire" and the code which reads and parses lease information after it has been written to disk storage. This flaw allows an attacker to deliberately cause a situation where dhcpd while running in DHCPv4 or DHCPv6 mode, or the dhclient attempts to read a stored lease that contains option information, to trigger a stack-based buffer overflow in the option parsing code for colon-separated hex digits values. The highest threat from this vulnerability is to data confidentiality and integrity as well as service availability.
Credit: security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/dhcp | <12:4.1.1-64.P1.el6_10 | 12:4.1.1-64.P1.el6_10 |
redhat/dhcp | <12:4.2.5-83.el7_9.1 | 12:4.2.5-83.el7_9.1 |
redhat/dhcp | <12:4.2.5-42.el7_2.2 | 12:4.2.5-42.el7_2.2 |
redhat/dhcp | <12:4.2.5-47.el7_3.2 | 12:4.2.5-47.el7_3.2 |
redhat/dhcp | <12:4.2.5-58.el7_4.5 | 12:4.2.5-58.el7_4.5 |
redhat/dhcp | <12:4.2.5-69.el7_6.1 | 12:4.2.5-69.el7_6.1 |
redhat/dhcp | <12:4.2.5-77.el7_7.1 | 12:4.2.5-77.el7_7.1 |
redhat/dhcp | <12:4.3.6-44.el8_4.1 | 12:4.3.6-44.el8_4.1 |
redhat/dhcp | <12:4.3.6-34.el8_1.2 | 12:4.3.6-34.el8_1.2 |
redhat/dhcp | <12:4.3.6-40.el8_2.2 | 12:4.3.6-40.el8_2.2 |
redhat/cri-o | <0:1.20.3-6.rhaos4.7.git0d0f863.el8 | 0:1.20.3-6.rhaos4.7.git0d0f863.el8 |
redhat/dhcp | <12:4.3.6-41.el8_3.1 | 12:4.3.6-41.el8_3.1 |
redhat/openshift-clients | <0:4.7.0-202106252127.p0.git.8b4b094.el7 | 0:4.7.0-202106252127.p0.git.8b4b094.el7 |
redhat/openshift-kuryr | <0:4.7.0-202106232224.p0.git.c7654fb.el8 | 0:4.7.0-202106232224.p0.git.c7654fb.el8 |
redhat/polkit | <0:0.115-11.el8_3.2 | 0:0.115-11.el8_3.2 |
redhat/redhat-virtualization-host | <0:4.3.16-20210615.0.el7_9 | 0:4.3.16-20210615.0.el7_9 |
redhat/dhcp | <4.4.2 | 4.4.2 |
redhat/dhcp | <4.1 | 4.1 |
ISC DHCP | >=4.4.0<=4.4.2 | |
ISC DHCP | =4.1-esv-r1 | |
ISC DHCP | =4.1-esv-r10 | |
ISC DHCP | =4.1-esv-r10_b1 | |
ISC DHCP | =4.1-esv-r10_rc1 | |
ISC DHCP | =4.1-esv-r10b1 | |
ISC DHCP | =4.1-esv-r10rc1 | |
ISC DHCP | =4.1-esv-r11 | |
ISC DHCP | =4.1-esv-r11_b1 | |
ISC DHCP | =4.1-esv-r11_rc1 | |
ISC DHCP | =4.1-esv-r11_rc2 | |
ISC DHCP | =4.1-esv-r11b1 | |
ISC DHCP | =4.1-esv-r11rc1 | |
ISC DHCP | =4.1-esv-r11rc2 | |
ISC DHCP | =4.1-esv-r12 | |
ISC DHCP | =4.1-esv-r12-p1 | |
ISC DHCP | =4.1-esv-r12_b1 | |
ISC DHCP | =4.1-esv-r12_p1 | |
ISC DHCP | =4.1-esv-r12b1 | |
ISC DHCP | =4.1-esv-r13 | |
ISC DHCP | =4.1-esv-r13_b1 | |
ISC DHCP | =4.1-esv-r13b1 | |
ISC DHCP | =4.1-esv-r14 | |
ISC DHCP | =4.1-esv-r14_b1 | |
ISC DHCP | =4.1-esv-r14b1 | |
ISC DHCP | =4.1-esv-r15 | |
ISC DHCP | =4.1-esv-r15-p1 | |
ISC DHCP | =4.1-esv-r15_b1 | |
ISC DHCP | =4.1-esv-r16 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =9.0 | |
Siemens Ruggedcom Rox Rx1400 Firmware | <2.15.0 | |
Siemens RUGGEDCOM ROX RX1400 | ||
Siemens Ruggedcom Rox Rx1500 Firmware | >=2.3.0<2.15.0 | |
Siemens RUGGEDCOM ROX RX1500 | ||
Siemens Ruggedcom Rox Rx1501 Firmware | >=2.3.0<2.15.0 | |
Siemens RUGGEDCOM ROX RX1501 | ||
Siemens Ruggedcom Rox Rx1510 Firmware | >=2.3.0<2.15.0 | |
Siemens RUGGEDCOM ROX RX1510 | ||
Siemens Ruggedcom Rox Rx1511 Firmware | >=2.3.0<2.15.0 | |
Siemens RUGGEDCOM ROX RX1511 | ||
Siemens Ruggedcom Rox Rx1512 Firmware | >=2.3.0<2.15.0 | |
Siemens RUGGEDCOM ROX RX1512 | ||
Siemens Ruggedcom Rox Rx1524 Firmware | <2.15.0 | |
Siemens Ruggedcom Rox Rx1524 | ||
Siemens Ruggedcom Rox Rx1536 Firmware | <2.15.0 | |
Siemens Ruggedcom Rox Rx1536 | ||
Siemens Ruggedcom Rox Rx5000 Firmware | >=2.3.0<2.15.0 | |
Siemens Ruggedcom Rox Rx5000 | ||
Siemens Ruggedcom Rox Mx5000 Firmware | >=2.3.0<2.15.0 | |
Siemens RUGGEDCOM ROX MX5000 | ||
NetApp ONTAP Select Deploy administration utility | ||
Netapp Solidfire \& Hci Management Node | ||
Siemens Sinec Ins | <1.0 | |
Siemens Sinec Ins | =1.0 | |
Siemens Sinec Ins | =1.0-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)