FreeBSD : isc-dhcp -- multiple vulnerabilities (c7fa3618-d5ff-11e1-90a2-000c299b62e1)

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

ISC reports :

An unexpected client identifier parameter can cause the ISC DHCP
daemon to segmentation fault when running in DHCPv6 mode, resulting in
a denial of service to further client requests. In order to exploit
this condition, an attacker must be able to send requests to the DHCP
server.

An error in the handling of malformed client identifiers can cause a
DHCP server running affected versions (see 'Impact') to enter a state
where further client requests are not processed and the server process
loops endlessly, consuming all available CPU cycles. Under normal
circumstances this condition should not be triggered, but a
non-conforming or malicious client could deliberately trigger it in a
vulnerable server. In order to exploit this condition an attacker must
be able to send requests to the DHCP server.

Two memory leaks have been found and fixed in ISC DHCP. Both are
reproducible when running in DHCPv6 mode (with the -6 command-line
argument.) The first leak is confirmed to only affect servers
operating in DHCPv6 mode, but based on initial code analysis the
second may theoretically affect DHCPv4 servers (though this has not
been demonstrated.)

See also :

https://kb.isc.org/article/AA-00714
https://kb.isc.org/article/AA-00712
https://kb.isc.org/article/AA-00737
http://www.nessus.org/u?d4692b76

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 6.1
(CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:C)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 60115 ()

Bugtraq ID:

CVE ID: CVE-2012-3570
CVE-2012-3571
CVE-2012-3954

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now