Page 4 of 20 results (0.009 seconds)

CVSS: 7.8EPSS: 95%CPEs: 92EXPL: 0

The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet. El servidor en ISC DHCP v3.x y v4.x anterior a v4.2.2, v3.1-ESV anterior a v3.1-ESV-R3, y v4.1-ESV anterior a v4.1-ESV-R3 permite a atacantes remotos provocar una denegación de servicio (salida de demonio) a través de un paquete BOOTP manipulado. • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761 http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065176.html http://lists.opensuse.org/opensuse-updates/2011-09/msg00014.html http://secunia.com/advisories/45582 http://secunia.com/advisories/45595 http://secunia.com/advisories/45629 http://secunia.com/advisories/45639 http://secunia.com/advisories/45817 http://secunia.com/advisories/45918 http://secunia.com/advisories/46780 http://security.gentoo.or • CWE-20: Improper Input Validation •

CVSS: 7.9EPSS: 96%CPEs: 67EXPL: 1

dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script. dhclient en ISC DHCP 3.0.x hasta la versión 4.2.x en versiones anteriores a 4.2.1-P1, 3.1-ESV en versiones anteriores a 3.1-ESV-R1 y 4.1-ESV en versiones anteriores a 4.1-ESV-R2 permite a atacantes remotos ejecutar comandos arbitrarios a través de metacaracteres shell en un nombre de anfitrión obtenido de un mensaje DHCP, como es demostrado por un nombre de anfitrión dado por dhclient-script. • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761 http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html http://marc.info/?l=bugtraq&m=133226187115472&w=2 http://secunia.com/advisories/44037 http://secunia.com/advisories/44048 http://secunia.com/advisories/44089 http://secunia.com/advisories/44090 http://secunia.com/advisories/44103 http://secunia.com/advisories/44127&# • CWE-20: Improper Input Validation CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.8EPSS: 1%CPEs: 29EXPL: 0

The DHCPv6 server in ISC DHCP 4.0.x and 4.1.x before 4.1.2-P1, 4.0-ESV and 4.1-ESV before 4.1-ESV-R1, and 4.2.x before 4.2.1b1 allows remote attackers to cause a denial of service (assertion failure and daemon crash) by sending a message over IPv6 for a declined and abandoned address. El servidor DHCPv6 en ISC DHCP v4.0.x y v4.1.x anterior a v.4.1.2-P1, v.4.0-ESV y v.4.1-ESV anterior a v.4.1-ESV-R1, y v.4.2.x anterior a v.4.2.1b1 permite a atacantes remotos provocar una denegación de servicio enviando mensajes sobre IPv6 para un declinado y abandono de la dirección. • http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053644.html http://secunia.com/advisories/43006 http://secunia.com/advisories/43104 http://secunia.com/advisories/43167 http://secunia.com/advisories/43354 http://secunia.com/advisories/43613 http://securitytracker.com/id?1024999 http://www.debian.org/security/2011/dsa-2184 http://www.isc.org/software/dhcp/advisories/cve-2011-0413 http://www.kb.cert.org/vuls/id/686084 http://www.mandriva.com/security/ • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 11%CPEs: 2EXPL: 0

ISC DHCP server 4.2 before 4.2.0-P2, when configured to use failover partnerships, allows remote attackers to cause a denial of service (communications-interrupted state and DHCP client service loss) by connecting to a port that is only intended for a failover peer, as demonstrated by a Nagios check_tcp process check to TCP port 520. ISC DHCP Server v4.2 anteriore a v4.2.0-P2, cuando está configurado para utilizar las asociaciones de redundancia, permite a atacantes remotos provocar una denegación de servicio (estado de las comunicaciones interrumpidas y la pérdida de servicio de cliente DHCP) mediante la conexión a un puerto que sólo se diseñó como par de redundancia, como lo demuestra un proceso de chequeo check_tcp al puerto TCP 520. • http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052329.html http://secunia.com/advisories/42618 http://secunia.com/advisories/42682 http://www.kb.cert.org/vuls/id/159528 http://www.mandriva.com/security/advisories?name=MDVSA-2011:001 http://www.securityfocus.com/bid/45360 http://www.securitytracker.com/id?1024862 http://www.vupen.com/english/advisories/2010/3208 http://www.vupen.com/english/advisories/2011/0052 https://lists.isc.org/pipermail/dhcp-users& • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 6%CPEs: 17EXPL: 0

ISC DHCP server 4.0 before 4.0.2, 4.1 before 4.1.2, and 4.2 before 4.2.0-P1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a DHCPv6 packet containing a Relay-Forward message without an address in the Relay-Forward link-address field. ISC DHCP server v4.0 anterior a v4.0.2, v4.1 anterior a v4.1.2, y v4.2 anterior a v4.2-P1 permite a atacantes remotos causar una denegación de servicio (caída) a través de un paquete DHCPv6 contiendo un mensaje Relay-Forward sin una dirección en el campo de dirección de enlace Relay-Forward • http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050766.html http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051287.html http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html http://osvdb.org/68999 http://secunia.com/advisories/42082 http://secunia.com/advisories/42345 http://secunia.com/advisories/42407 http://www.isc.org/software/dhcp/advisories/cve-2010-3611 http://www.kb.cert.org/vuls/id/102047 http://www.mandri • CWE-476: NULL Pointer Dereference •