#VU10031 Resource exhaustion in DHCP

Published: 2018-01-17

Vulnerability identifier: #VU10031

Vulnerability risk: Low

CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:W/RC:C]

CVE-ID: CVE-2017-3144


Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Server applications / Other server solutions

Vendor: ISC

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to improper cleaning up of closed OMAPI connections. A remote attacker who is permitted to establish connections to the OMAPI control port can trigger exhaustion of the pool of socket descriptors available to the DHCP server and cause the service to crash.

The recommended remedy is to disallow access to the OMAPI control port from unauthorized clients (in accordance with best practices for server operation).

Vulnerable software versions

DHCP: 4.1-esv - 4.1.0, 4.2.0 - 4.2.8, 4.3.0 - 4.3.6

External links

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

Latest bulletins with this vulnerability