// For flags

CVE-2019-6474

A packet containing a malformed DUID can cause the kea-dhcp6 server to terminate

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A missing check on incoming client requests can be exploited to cause a situation where the Kea server's lease storage contains leases which are rejected as invalid when the server tries to load leases from storage on restart. If the number of such leases exceeds a hard-coded limit in the Kea code, a server trying to restart will conclude that there is a problem with its lease store and give up. Versions affected: 1.4.0 to 1.5.0, 1.6.0-beta1, and 1.6.0-beta2

Una falta de comprobación en las peticiones de clientes entrantes puede ser explotadas para causar una situación en la que el almacenamiento arrendado del servidor Kea contiene arrendamientos que son rechazados como no válidos cuando el servidor intenta cargar arrendamientos del almacenamiento al reiniciar. Si el número de tales arrendamientos excede un límite codificado en el código Kea, un servidor que intente reiniciar concluirá que existe un problema con su almacén de arrendamientos y se dará por vencido. Versiones afectadas: 1.4.0 hasta 1.5.0, 1.6.0-beta1 y 1.6.0-beta2

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-01-16 CVE Reserved
  • 2019-10-16 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-772: Missing Release of Resource after Effective Lifetime
CAPEC
References (1)
URL Tag Source
URL Date SRC
URL Date SRC
URL Date SRC
https://kb.isc.org/docs/cve-2019-6474 2020-08-24
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Isc
Search vendor "Isc"
Kea
Search vendor "Isc" for product "Kea"
>= 1.4.0 <= 1.5.0
Search vendor "Isc" for product "Kea" and version " >= 1.4.0 <= 1.5.0"
-
Affected
Isc
Search vendor "Isc"
Kea
Search vendor "Isc" for product "Kea"
1.6.0
Search vendor "Isc" for product "Kea" and version "1.6.0"
beta1
Affected
Isc
Search vendor "Isc"
Kea
Search vendor "Isc" for product "Kea"
1.6.0
Search vendor "Isc" for product "Kea" and version "1.6.0"
beta2
Affected