#VU10031 Resource exhaustion in DHCP


Published: 2018-01-17

Vulnerability identifier: #VU10031

Vulnerability risk: Low

CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:W/RC:C]

CVE-ID: CVE-2017-3144

CWE-ID: CWE-400

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
DHCP
Server applications / Other server solutions

Vendor: ISC

Description
The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to improper cleaning up of closed OMAPI connections. A remote attacker who is permitted to establish connections to the OMAPI control port can trigger exhaustion of the pool of socket descriptors available to the DHCP server and cause the service to crash.

Mitigation
The recommended remedy is to disallow access to the OMAPI control port from unauthorized clients (in accordance with best practices for server operation).

Vulnerable software versions

DHCP: 4.1-esv - 4.1.0, 4.2.0 - 4.2.8, 4.3.0 - 4.3.6


External links
http://kb.isc.org/article/AA-01541


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability