DHCP: ISC DHCPD Server Maximum Message Size Denial of Service

This signature detects attempts to exploit a known vulnerability against ISC DHCPD Server. A successful attack can result in a denial-of-service condition.

Extended Description

ISC DHCPD is prone to a remote stack-corruption vulnerability because the software fails to properly bounds-check user-supplied input. Successfully exploiting this issue allows attackers in the same LAN segment of the vulnerable DHCP server to corrupt the application's stack. This may allow attackers to run arbitrary machine code and to compromise affected computers. ISC DHCP versions in the 2.x series are vulnerable to this issue. OpenBSD's 'dhcpd' is a fork of ISC DHCPD and is also vulnerable.

Affected Products

Isc dhcpd,Debian linux

References

BugTraq: 32213 25984 25729

CVE: CVE-2007-0063

Short Name
DHCP:OPT:ISC-DHCPD-MMS-DOS
Severity
Major
Recommended
False
Recommended Action
Drop
Category
DHCP
Keywords
CVE-2007-0063 CVE-2007-5365 CVE-2008-5010 DHCPD Denial ISC Maximum Message Server Service Size bid:25729 bid:25984 bid:32213 of
Release Date
03/20/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Red_hat

Openbsd

Sun

Ubuntu

Isc

Debian

CVSS Score

10.0

7.2

Found a potential security threat?