what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 4133-1

Debian Security Advisory 4133-1
Posted Mar 8, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4133-1 - Several vulnerabilities have been discovered in the ISC DHCP client, relay and server.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2017-3144, CVE-2018-5732, CVE-2018-5733
SHA-256 | c58ee2bf8108db3389764cac6cd30a9da1198010a531df96cc285fd0d9113f86

Debian Security Advisory 4133-1

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

--------------------------------------------------------------------------
Debian Security Advisory DSA-4133-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
March 07, 2018 https://www.debian.org/security/faq
--------------------------------------------------------------------------

Package : isc-dhcp
CVE ID : CVE-2017-3144 CVE-2018-5732 CVE-2018-5733
Debian Bug : 887413 891785 891786

Several vulnerabilities have been discovered in the ISC DHCP client,
relay and server. The Common Vulnerabilities and Exposures project
identifies the following issues:

CVE-2017-3144

It was discovered that the DHCP server does not properly clean up
closed OMAPI connections, which can lead to exhaustion of the pool
of socket descriptors available to the DHCP server, resulting in
denial of service.

CVE-2018-5732

Felix Wilhelm of the Google Security Team discovered that the DHCP
client is prone to an out-of-bound memory access vulnerability when
processing specially constructed DHCP options responses, resulting
in potential execution of arbitrary code by a malicious DHCP server.

CVE-2018-5733

Felix Wilhelm of the Google Security Team discovered that the DHCP
server does not properly handle reference counting when processing
client requests. A malicious client can take advantage of this flaw
to cause a denial of service (dhcpd crash) by sending large amounts
of traffic.

For the oldstable distribution (jessie), these problems have been fixed
in version 4.3.1-6+deb8u3.

For the stable distribution (stretch), these problems have been fixed in
version 4.3.5-3+deb9u1.

We recommend that you upgrade your isc-dhcp packages.

For the detailed security status of isc-dhcp please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/isc-dhcp

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlqgZQdfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0S4qQ//VNSM01tKHKfBTlVrJdIqghjEyanHVqExQCBATd4SzRKykKsEnBi2L1q3
o4aAkINuGcjSCbK21GywMygRJDGcALZG2ppSIycdnZvmtszIKhsLYKSBlF5sR0J9
/EWzp9EkcvJfdhpU5lytl33JjyqmNA2YM/dixoPTqhZi/xHBxlTPuj/H9lB2phyV
I4c6x4zefXRTLNSRJkeedvgV63nnM71zmbkICdsXQ35xtDa/RWwJIEhOBgsUINbY
OG/YUMZlhxo74eaCb91xDFB+zIwhK3JAUk6zKVVaElTwxhb7sdWaPS3x6lz7rCe+
uzjiHHmFDYvtIGGCO8umzZR9KYZd8DjekzbRvs8ROL4CaWCoaplx9ESm6E/rTdHh
VU+bDrDQsJt0CLHziekTu6KjWZQkEUUI/48SOBY4olKshLbQFV76kSr1HZZ6SmBb
EkKQHNF9kgS6eXwekxV0RG6tSudPZaDtBldPqEQUPoeRMrDawDO4SjGbMz7bzgEU
3nJOn9AdYzGfLkpHukTP9JSJiHh0hQUsB0MlA+Khs/OzbG7Drr0zjWi8naz1d0ZI
v3svwC3DLryNOk5ePYDkrRXvTyzKXCiF1X29mxpfQDB3lLkFaie/MDM8alKQr1Lr
EwCwSRx6UjpXFhB8jhktM55aKz8zyZyW2JtLwKeGB74ZbM8LH+Q=
=sS82
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close