CVE-2011-4539

dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2011-December/070980.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071549.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2011-12/msg00006.html Mailing List Third Party Advisory
http://secunia.com/advisories/47153 Third Party Advisory
http://secunia.com/advisories/47178 Third Party Advisory
http://security.gentoo.org/glsa/glsa-201301-06.xml Third Party Advisory
http://www.debian.org/security/2012/dsa-2519 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:182 Third Party Advisory
http://www.securityfocus.com/bid/50971 Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1026393 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-1309-1 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/71680 Third Party Advisory VDB Entry
https://www.isc.org/software/dhcp/advisories/cve-2011-4539 Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-December/070980.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071549.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2011-12/msg00006.html Mailing List Third Party Advisory
http://secunia.com/advisories/47153 Third Party Advisory
http://secunia.com/advisories/47178 Third Party Advisory
http://security.gentoo.org/glsa/glsa-201301-06.xml Third Party Advisory
http://www.debian.org/security/2012/dsa-2519 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:182 Third Party Advisory
http://www.securityfocus.com/bid/50971 Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1026393 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-1309-1 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/71680 Third Party Advisory VDB Entry
https://www.isc.org/software/dhcp/advisories/cve-2011-4539 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:isc:dhcp:4.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.0.1:-:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.0.1:b1:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.0.1:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.0.2:-:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.0.2:b1:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.0.2:b2:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.0.2:b3:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.0.2:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.0.3:-:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.0.3:b1:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.0.3:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.1.1:b3:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.1.1:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.2.1:-:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.2.2:-:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.2.2:b1:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.2.2:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.2.3:-:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*
cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:32

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-December/070980.html - Mailing List, Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2011-December/070980.html - Mailing List, Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071549.html - Mailing List, Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071549.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-updates/2011-12/msg00006.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2011-12/msg00006.html - Mailing List, Third Party Advisory
References () http://secunia.com/advisories/47153 - Third Party Advisory () http://secunia.com/advisories/47153 - Third Party Advisory
References () http://secunia.com/advisories/47178 - Third Party Advisory () http://secunia.com/advisories/47178 - Third Party Advisory
References () http://security.gentoo.org/glsa/glsa-201301-06.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-201301-06.xml - Third Party Advisory
References () http://www.debian.org/security/2012/dsa-2519 - Third Party Advisory () http://www.debian.org/security/2012/dsa-2519 - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:182 - Third Party Advisory () http://www.mandriva.com/security/advisories?name=MDVSA-2011:182 - Third Party Advisory
References () http://www.securityfocus.com/bid/50971 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/50971 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1026393 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1026393 - Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-1309-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-1309-1 - Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/71680 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/71680 - Third Party Advisory, VDB Entry
References () https://www.isc.org/software/dhcp/advisories/cve-2011-4539 - Vendor Advisory () https://www.isc.org/software/dhcp/advisories/cve-2011-4539 - Vendor Advisory

Information

Published : 2011-12-08 11:55

Updated : 2024-11-21 01:32


NVD link : CVE-2011-4539

Mitre link : CVE-2011-4539

CVE.ORG link : CVE-2011-4539


JSON object : View

Products Affected

canonical

  • ubuntu_linux

isc

  • dhcp

debian

  • debian_linux
CWE
CWE-20

Improper Input Validation