fkie_cve-2010-3611
Vulnerability from fkie_nvd
Published
2010-11-04 18:00
Modified
2025-04-11 00:51
Severity ?
Summary
ISC DHCP server 4.0 before 4.0.2, 4.1 before 4.1.2, and 4.2 before 4.2.0-P1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a DHCPv6 packet containing a Relay-Forward message without an address in the Relay-Forward link-address field.
References
cret@cert.orghttp://lists.fedoraproject.org/pipermail/package-announce/2010-November/050766.html
cret@cert.orghttp://lists.fedoraproject.org/pipermail/package-announce/2010-November/051287.html
cret@cert.orghttp://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
cret@cert.orghttp://osvdb.org/68999
cret@cert.orghttp://secunia.com/advisories/42082Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/42345
cret@cert.orghttp://secunia.com/advisories/42407
cret@cert.orghttp://www.isc.org/software/dhcp/advisories/cve-2010-3611Vendor Advisory
cret@cert.orghttp://www.kb.cert.org/vuls/id/102047US Government Resource
cret@cert.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:226
cret@cert.orghttp://www.redhat.com/support/errata/RHSA-2010-0923.html
cret@cert.orghttp://www.securityfocus.com/bid/44615
cret@cert.orghttp://www.vupen.com/english/advisories/2010/2879Patch, Vendor Advisory
cret@cert.orghttp://www.vupen.com/english/advisories/2010/3044
cret@cert.orghttp://www.vupen.com/english/advisories/2010/3092
cret@cert.orghttps://bugzilla.redhat.com/show_bug.cgi?id=649877
cret@cert.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/62965
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050766.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051287.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/68999
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42082Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42345
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42407
af854a3a-2127-422b-91ae-364da2661108http://www.isc.org/software/dhcp/advisories/cve-2010-3611Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/102047US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:226
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0923.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/44615
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/2879Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/3044
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/3092
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=649877
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/62965
Impacted products
Vendor Product Version
isc dhcp 4.0
isc dhcp 4.0.0
isc dhcp 4.0.1
isc dhcp 4.0.1
isc dhcp 4.0.1
isc dhcp 4.1.0
isc dhcp 4.1.1
isc dhcp 4.1.1
isc dhcp 4.1.1
isc dhcp 4.1.1
isc dhcp 4.1.1
isc dhcp 4.2.0
isc dhcp 4.2.0
isc dhcp 4.2.0
isc dhcp 4.2.0
isc dhcp 4.2.0
isc dhcp 4.2.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:isc:dhcp:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "685EB87F-756C-4DBA-A347-171470EA0B47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:dhcp:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "79DA60EA-F94F-4890-BF9E-E142BC219118",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:dhcp:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBC3A7C-1025-4DF6-8250-44C38CB52444",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:dhcp:4.0.1:b1:*:*:*:*:*:*",
              "matchCriteriaId": "1F1D4AC8-EF46-4770-88D0-8625CA3B0494",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:dhcp:4.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FAD5E62F-2C6E-4E78-BDED-1E98F4B6AB99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:dhcp:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41B46352-9D4D-4C74-876F-3685016025CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:dhcp:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "234EE34E-44F4-45F0-A19A-D369BA5043C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:dhcp:4.1.1:b1:*:*:*:*:*:*",
              "matchCriteriaId": "4479C934-BF9A-428F-AD22-41C45B70C546",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:dhcp:4.1.1:b2:*:*:*:*:*:*",
              "matchCriteriaId": "11EE9507-6827-4CFF-B3B4-9DC4DE3E0B1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:dhcp:4.1.1:b3:*:*:*:*:*:*",
              "matchCriteriaId": "E6CE1A0F-BE1E-4312-B68F-F09B05929F9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:dhcp:4.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "17B6DEFA-0977-474A-9871-B03DEE924ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:dhcp:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AFCB588-F1C0-4276-993C-CB0FA2BE21F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*",
              "matchCriteriaId": "56113AB6-8295-4EB7-A003-79049FBB8B4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*",
              "matchCriteriaId": "362DA97E-B940-4649-803F-26D8C1D16DA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "950A6BA0-C348-4B89-8C18-F2AFA467649F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "9088D042-F104-4F31-AEBB-75F5A0F03AE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1C49DF07-9612-43C7-9771-B76487B4A9CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ISC DHCP server 4.0 before 4.0.2, 4.1 before 4.1.2, and 4.2 before 4.2.0-P1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a DHCPv6 packet containing a Relay-Forward message without an address in the Relay-Forward link-address field."
    },
    {
      "lang": "es",
      "value": "ISC DHCP server v4.0 anterior a v4.0.2, v4.1 anterior a v4.1.2, y v4.2 anterior a v4.2-P1 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de un paquete DHCPv6  contiendo un mensaje Relay-Forward sin una direcci\u00f3n en el campo de direcci\u00f3n de enlace Relay-Forward"
    }
  ],
  "id": "CVE-2010-3611",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-11-04T18:00:02.627",
  "references": [
    {
      "source": "cret@cert.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050766.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051287.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://osvdb.org/68999"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42082"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/42345"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/42407"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.isc.org/software/dhcp/advisories/cve-2010-3611"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/102047"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:226"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0923.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securityfocus.com/bid/44615"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2879"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2010/3044"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2010/3092"
    },
    {
      "source": "cret@cert.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649877"
    },
    {
      "source": "cret@cert.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62965"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050766.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051287.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/68999"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42082"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/42345"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/42407"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.isc.org/software/dhcp/advisories/cve-2010-3611"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/102047"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:226"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0923.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/44615"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2879"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/3044"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/3092"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649877"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62965"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…