ISC DHCP 4.1.x before 4.1-ESV-R13 and 4.2.x and 4.3.x before 4.3.4 does not restrict the number of concurrent TCP sessions, which allows remote attackers to cause a denial of service (INSIST assertion failure or request-processing outage) by establishing many sessions.
References
Link | Resource |
---|---|
https://kb.isc.org/article/AA-01354 | Vendor Advisory |
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html | Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2016-07/msg00066.html | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/84208 | Third Party Advisory VDB Entry |
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183640.html | Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183458.html | Third Party Advisory |
http://www.securitytracker.com/id/1035196 | Third Party Advisory VDB Entry |
http://rhn.redhat.com/errata/RHSA-2016-2590.html | Third Party Advisory |
https://usn.ubuntu.com/3586-1/ | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/11/msg00023.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2016-03-09 07:59
Updated : 2020-01-08 09:17
NVD link : CVE-2016-2774
Mitre link : CVE-2016-2774
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
isc
- dhcp