Risk | Low |
Patch available | NO |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2017-3144 |
CWE-ID | CWE-400 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
DHCP Server applications / Other server solutions |
Vendor | ISC |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU10031
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2017-3144
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to improper cleaning up of closed OMAPI connections. A remote attacker who is permitted to establish connections to the OMAPI control port can trigger exhaustion of the pool of socket descriptors available to the DHCP server and cause the service to crash.
The recommended remedy is to disallow access to the OMAPI control port from unauthorized clients (in accordance with best practices for server operation).
DHCP: 4.1-esv - 4.3.6
CPE2.3 External linkshttp://kb.isc.org/article/AA-01541
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?