This script is Copyright (C) 2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
ISC Support reports :
ISC Kea may terminate unexpectedly (crash) while handling a malformed
client packet. Related defects in the kea-dhcp4 and kea-dhcp6 servers
can cause the server to crash during option processing if a client
sends a malformed packet. An attacker sending a crafted malformed
packet can cause an ISC Kea server providing DHCP services to IPv4 or
IPv6 clients to exit unexpectedly.
- The kea-dhcp4 server is vulnerable only in versions 0.9.2 and
1.0.0-beta, and furthermore only when logging at debug level 40 or
higher. Servers running kea-dhcp4 versions 0.9.1 or lower, and servers
which are not logging or are logging at debug level 39 or below are
- The kea-dhcp6 server is vulnerable only in versions 0.9.2 and
1.0.0-beta, and furthermore only when logging at debug level 45 or
higher. Servers running kea-dhcp6 versions 0.9.1 or lower, and servers
which are not logging or are logging at debug level 44 or below are
See also :
Update the affected package.
Risk factor :
High / CVSS Base Score : 7.1