First published: Wed Dec 06 2017(Updated: )
It was found that omapi code doesn't free socket descriptor if empty message was sent by client, which allows malicious client to use up all available descriptors causing Denial of Service. Upstream patch: <a href="https://source.isc.org/cgi-bin/gitweb.cgi?p=dhcp.git;a=commit;h=1a6b62fe17a">https://source.isc.org/cgi-bin/gitweb.cgi?p=dhcp.git;a=commit;h=1a6b62fe17a</a>
Affected Software | Affected Version | How to fix |
---|---|---|
ISC DHCP Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1522918 is high due to the potential for Denial of Service caused by the exhaustion of available socket descriptors.
To fix REDHAT-BUG-1522918, you should apply the upstream patch provided by ISC for the DHCP server.
The affected product for REDHAT-BUG-1522918 is the ISC DHCP Server.
The attack vector associated with REDHAT-BUG-1522918 involves sending empty messages by a malicious client to consume all available socket descriptors.
REDHAT-BUG-1522918 is a Denial of Service vulnerability.