cnvd-2022-87943
Vulnerability from cnvd
Title: ISC DHCP拒绝服务漏洞
Description:
ISC DHCP是美国ISC公司的一套开源的动态主机配置协议服务器软件。
ISC DHCP存在拒绝服务漏洞,该漏洞源于当从add_option()调用函数option_code_hash_lookup()时,它会增加选项的refcount字段,但是未对option_dereference()的相应调用来减少refcount字段,函数add_option()仅用于服务器对租约查询数据包的响应,每个租约查询响应都会为多个选项调用此函数,攻击者可利用漏洞触发引用计数器溢出,导致拒绝服务。
Severity: 中
Patch Name: ISC DHCP拒绝服务漏洞的补丁
Patch Description:
ISC DHCP是美国ISC公司的一套开源的动态主机配置协议服务器软件。
ISC DHCP存在拒绝服务漏洞,该漏洞源于当从add_option()调用函数option_code_hash_lookup()时,它会增加选项的refcount字段,但是未对option_dereference()的相应调用来减少refcount字段,函数add_option()仅用于服务器对租约查询数据包的响应,每个租约查询响应都会为多个选项调用此函数,攻击者可利用漏洞触发引用计数器溢出,导致拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://github.com/isc-projects/dhcp/releases/tag/v4_4_2b1_f2
Reference: https://kb.isc.org/docs/cve-2022-2928
Name | ['ISC DHCP >=4.4.0,<=4.4.3', 'ISC DHCP 4.1-esv r1', 'ISC DHCP 4.1-esv r10', 'ISC DHCP 4.1-esv r10_b1', 'ISC DHCP 4.1-esv r10_rc1', 'ISC DHCP 4.1-esv r10b1', 'ISC DHCP 4.1-esv r10rc1', 'ISC DHCP 4.1-esv r11', 'ISC DHCP 4.1-esv r11_b1', 'ISC DHCP 4.1-esv r11_rc1', 'ISC DHCP 4.1-esv r11_rc2', 'ISC DHCP 4.1-esv r11b1', 'ISC DHCP 4.1-esv r11rc1', 'ISC DHCP 4.1-esv r11rc', 'ISC DHCP 4.1-esv r12', 'ISC DHCP 4.1-esv r12-p1', 'ISC DHCP 4.1-esv r12_b1', 'ISC DHCP 4.1-esv r12_p1', 'ISC DHCP 4.1-esv r12b1', 'ISC DHCP 4.1-esv r13', 'ISC DHCP 4.1-esv r13_b1', 'ISC DHCP 4.1-esv r13b1', 'ISC DHCP 4.1-esv r14', 'ISC DHCP 4.1-esvr14_b1', 'ISC DHCP 4.1-esv r14b1', 'ISC DHCP 4.1-esv r15', 'ISC DHCP 4.1-esv r15-p1', 'ISC DHCP 4.1-esv r15_b1', 'ISC DHCP 4.1-esv r16', 'ISC DHCP 4.1-esv r16-p1'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2022-2928", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-2928" } }, "description": "ISC DHCP\u662f\u7f8e\u56fdISC\u516c\u53f8\u7684\u4e00\u5957\u5f00\u6e90\u7684\u52a8\u6001\u4e3b\u673a\u914d\u7f6e\u534f\u8bae\u670d\u52a1\u5668\u8f6f\u4ef6\u3002\n\nISC DHCP\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5f53\u4eceadd_option()\u8c03\u7528\u51fd\u6570option_code_hash_lookup()\u65f6\uff0c\u5b83\u4f1a\u589e\u52a0\u9009\u9879\u7684refcount\u5b57\u6bb5\uff0c\u4f46\u662f\u672a\u5bf9option_dereference()\u7684\u76f8\u5e94\u8c03\u7528\u6765\u51cf\u5c11refcount\u5b57\u6bb5\uff0c\u51fd\u6570add_option()\u4ec5\u7528\u4e8e\u670d\u52a1\u5668\u5bf9\u79df\u7ea6\u67e5\u8be2\u6570\u636e\u5305\u7684\u54cd\u5e94\uff0c\u6bcf\u4e2a\u79df\u7ea6\u67e5\u8be2\u54cd\u5e94\u90fd\u4f1a\u4e3a\u591a\u4e2a\u9009\u9879\u8c03\u7528\u6b64\u51fd\u6570\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u89e6\u53d1\u5f15\u7528\u8ba1\u6570\u5668\u6ea2\u51fa\uff0c\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://github.com/isc-projects/dhcp/releases/tag/v4_4_2b1_f2", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2022-87943", "openTime": "2022-12-14", "patchDescription": "ISC DHCP\u662f\u7f8e\u56fdISC\u516c\u53f8\u7684\u4e00\u5957\u5f00\u6e90\u7684\u52a8\u6001\u4e3b\u673a\u914d\u7f6e\u534f\u8bae\u670d\u52a1\u5668\u8f6f\u4ef6\u3002\r\n\r\nISC DHCP\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5f53\u4eceadd_option()\u8c03\u7528\u51fd\u6570option_code_hash_lookup()\u65f6\uff0c\u5b83\u4f1a\u589e\u52a0\u9009\u9879\u7684refcount\u5b57\u6bb5\uff0c\u4f46\u662f\u672a\u5bf9option_dereference()\u7684\u76f8\u5e94\u8c03\u7528\u6765\u51cf\u5c11refcount\u5b57\u6bb5\uff0c\u51fd\u6570add_option()\u4ec5\u7528\u4e8e\u670d\u52a1\u5668\u5bf9\u79df\u7ea6\u67e5\u8be2\u6570\u636e\u5305\u7684\u54cd\u5e94\uff0c\u6bcf\u4e2a\u79df\u7ea6\u67e5\u8be2\u54cd\u5e94\u90fd\u4f1a\u4e3a\u591a\u4e2a\u9009\u9879\u8c03\u7528\u6b64\u51fd\u6570\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u89e6\u53d1\u5f15\u7528\u8ba1\u6570\u5668\u6ea2\u51fa\uff0c\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "ISC DHCP\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "ISC DHCP \u003e=4.4.0\uff0c\u003c=4.4.3", "ISC DHCP 4.1-esv r1", "ISC DHCP 4.1-esv r10", "ISC DHCP 4.1-esv r10_b1", "ISC DHCP 4.1-esv r10_rc1", "ISC DHCP 4.1-esv r10b1", "ISC DHCP 4.1-esv r10rc1", "ISC DHCP 4.1-esv r11", "ISC DHCP 4.1-esv r11_b1", "ISC DHCP 4.1-esv r11_rc1", "ISC DHCP 4.1-esv r11_rc2", "ISC DHCP 4.1-esv r11b1", "ISC DHCP 4.1-esv r11rc1", "ISC DHCP 4.1-esv r11rc", "ISC DHCP 4.1-esv r12", "ISC DHCP 4.1-esv r12-p1", "ISC DHCP 4.1-esv r12_b1", "ISC DHCP 4.1-esv r12_p1", "ISC DHCP 4.1-esv r12b1", "ISC DHCP 4.1-esv r13", "ISC DHCP 4.1-esv r13_b1", "ISC DHCP 4.1-esv r13b1", "ISC DHCP 4.1-esv r14", "ISC DHCP 4.1-esvr14_b1", "ISC DHCP 4.1-esv r14b1", "ISC DHCP 4.1-esv r15", "ISC DHCP 4.1-esv r15-p1", "ISC DHCP 4.1-esv r15_b1", "ISC DHCP 4.1-esv r16", "ISC DHCP 4.1-esv r16-p1" ] }, "referenceLink": "https://kb.isc.org/docs/cve-2022-2928", "serverity": "\u4e2d", "submitTime": "2022-10-11", "title": "ISC DHCP\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.