FreeBSD : kea -- unexpected termination while handling a malformed packet (59e7eb28-b309-11e5-af83-80ee73b5dcf5)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

ISC Support reports :

ISC Kea may terminate unexpectedly (crash) while handling a malformed
client packet. Related defects in the kea-dhcp4 and kea-dhcp6 servers
can cause the server to crash during option processing if a client
sends a malformed packet. An attacker sending a crafted malformed
packet can cause an ISC Kea server providing DHCP services to IPv4 or
IPv6 clients to exit unexpectedly.

- The kea-dhcp4 server is vulnerable only in versions 0.9.2 and
1.0.0-beta, and furthermore only when logging at debug level 40 or
higher. Servers running kea-dhcp4 versions 0.9.1 or lower, and servers
which are not logging or are logging at debug level 39 or below are
not vulnerable.

- The kea-dhcp6 server is vulnerable only in versions 0.9.2 and
1.0.0-beta, and furthermore only when logging at debug level 45 or
higher. Servers running kea-dhcp6 versions 0.9.1 or lower, and servers
which are not logging or are logging at debug level 44 or below are
not vulnerable.

See also :

http://www.nessus.org/u?7d30aa3c
http://www.nessus.org/u?51aeddd3

Solution :

Update the affected package.

Risk factor :

High / CVSS Base Score : 7.1
(CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 87744 ()

Bugtraq ID:

CVE ID: CVE-2015-8373

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now