Lucene search

K
cve[email protected]CVE-2011-2748
HistoryAug 15, 2011 - 9:55 p.m.

CVE-2011-2748

2011-08-1521:55:02
CWE-20
web.nvd.nist.gov
52
isc dhcp
denial of service
remote attackers
crafted dhcp packet
cve-2011-2748
nvd

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

6.2 Medium

AI Score

Confidence

Low

0.963 High

EPSS

Percentile

99.6%

The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.

Affected configurations

NVD
Node
iscdhcpMatch3.0
OR
iscdhcpMatch3.0.1-
OR
iscdhcpMatch3.0.1rc1
OR
iscdhcpMatch3.0.1rc10
OR
iscdhcpMatch3.0.1rc11
OR
iscdhcpMatch3.0.1rc12
OR
iscdhcpMatch3.0.1rc13
OR
iscdhcpMatch3.0.1rc14
OR
iscdhcpMatch3.0.1rc2
OR
iscdhcpMatch3.0.1rc5
OR
iscdhcpMatch3.0.1rc6
OR
iscdhcpMatch3.0.1rc7
OR
iscdhcpMatch3.0.1rc8
OR
iscdhcpMatch3.0.1rc9
OR
iscdhcpMatch3.0.2-
OR
iscdhcpMatch3.0.2b1
OR
iscdhcpMatch3.0.2rc1
OR
iscdhcpMatch3.0.2rc2
OR
iscdhcpMatch3.0.2rc3
OR
iscdhcpMatch3.0.3b1
OR
iscdhcpMatch3.0.3b2
OR
iscdhcpMatch3.0.3b3
OR
iscdhcpMatch3.0.4-
OR
iscdhcpMatch3.0.4b1
OR
iscdhcpMatch3.0.4b2
OR
iscdhcpMatch3.0.4b3
OR
iscdhcpMatch3.0.4rc1
OR
iscdhcpMatch3.0.5-
OR
iscdhcpMatch3.0.5rc1
OR
iscdhcpMatch3.0.6rc1
OR
iscdhcpMatch3.1
OR
iscdhcpMatch3.1-esv
OR
iscdhcpMatch3.1.0-
OR
iscdhcpMatch3.1.0a1
OR
iscdhcpMatch3.1.0a2
OR
iscdhcpMatch3.1.0a3
OR
iscdhcpMatch3.1.0b1
OR
iscdhcpMatch3.1.0b2
OR
iscdhcpMatch3.1.0rc1
OR
iscdhcpMatch3.1.1-
OR
iscdhcpMatch3.1.1rc1
OR
iscdhcpMatch3.1.1rc2
OR
iscdhcpMatch3.1.2-
OR
iscdhcpMatch3.1.2b1
OR
iscdhcpMatch3.1.2rc1
OR
iscdhcpMatch3.1.3-
OR
iscdhcpMatch3.1.3b1
OR
iscdhcpMatch3.1.3rc1
OR
iscdhcpMatch4.0
OR
iscdhcpMatch4.0-esv
OR
iscdhcpMatch4.0.0
OR
iscdhcpMatch4.0.1-
OR
iscdhcpMatch4.0.1b1
OR
iscdhcpMatch4.0.1rc1
OR
iscdhcpMatch4.0.2-
OR
iscdhcpMatch4.0.2b1
OR
iscdhcpMatch4.0.2b2
OR
iscdhcpMatch4.0.2b3
OR
iscdhcpMatch4.0.2rc1
OR
iscdhcpMatch4.0.3-
OR
iscdhcpMatch4.0.3b1
OR
iscdhcpMatch4.0.3rc1
OR
iscdhcpMatch4.1-esv-
OR
iscdhcpMatch4.1-esvr1
OR
iscdhcpMatch4.1-esvr2
OR
iscdhcpMatch4.1-esvr3
OR
iscdhcpMatch4.1-esvr3_b1
OR
iscdhcpMatch4.1-esvrc1
OR
iscdhcpMatch4.1.0
OR
iscdhcpMatch4.1.1-
OR
iscdhcpMatch4.1.1b1
OR
iscdhcpMatch4.1.1b2
OR
iscdhcpMatch4.1.1b3
OR
iscdhcpMatch4.1.1rc1
OR
iscdhcpMatch4.1.2
OR
iscdhcpMatch4.2.0-
OR
iscdhcpMatch4.2.0a1
OR
iscdhcpMatch4.2.0a2
OR
iscdhcpMatch4.2.0b1
OR
iscdhcpMatch4.2.0b2
OR
iscdhcpMatch4.2.0p1
OR
iscdhcpMatch4.2.0rc1
OR
iscdhcpMatch4.2.1-
OR
iscdhcpMatch4.2.1b1
OR
iscdhcpMatch4.2.1rc1
Node
canonicalubuntu_linuxMatch8.04lts
OR
canonicalubuntu_linuxMatch10.04lts
OR
canonicalubuntu_linuxMatch10.10
OR
canonicalubuntu_linuxMatch11.04
Node
debiandebian_linuxMatch5.0
OR
debiandebian_linuxMatch6.0
OR
debiandebian_linuxMatch7.0

References

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

6.2 Medium

AI Score

Confidence

Low

0.963 High

EPSS

Percentile

99.6%