Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2011.1227 DHCP: Denial of service 9 December 2011 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: DHCP Publisher: ISC Operating System: UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2011-4539 Original Bulletin: https://www.isc.org/software/dhcp/advisories/cve-2011-4539 - --------------------------BEGIN INCLUDED TEXT-------------------- Security Advisory - DHCP Regular Expressions Segfault Summary: Segmentation fault from dhcpd while processing an evaluated regular expression CVE: CVE-2011-4539 Document Version: 1.2 Posting date: 07 Dec 2011 Program Impacted: DHCP Versions affected: 4.0.x and higher, including all EOL versions back to 4.0, 4.1-ESV, and 4.2.x Severity: Medium Exploitable: remotely Description: A bug exists which allows an attacker who is able to send DHCP Request packets, either directly or through a relay, to remotely crash an ISC DHCP server if that server is configured to evaluate expressions using a regular expression (i.e. uses the "~=" or "~~" comparison operators.) Further details are being withheld to allow administrators of affected systems time to patch. You are potentially vulnerable if you use regular expression comparison operators in your dhcpd.conf. CVSS Score: 6.1 CVSS Equation: AV: For more information on the Common Vulnerability Scoring System and to obtain your specific environmental score please visit: http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2&vector=(tbd) Workarounds: This bug cannot be triggered if you are not using regular expressions in your configuration file. Active exploits: None known at this time. Solution: Upgrade to 4.1-ESV-R4 or 4.2.3-P1 Download patched versions from the following location: http://www.isc.org/software/dhcp Acknowledgment: Thank you to BlueCat Networks for finding and testing the issue. Document Revision History 1.0 30 November 2011 - Phase I notified 1.1 6 December 2011 - Phase II & III notified 1.2 7 December 2011 - Public Release Related Document: References: - Do you have Questions? Questions regarding this advisory should go to security-officer@isc.org. - ISC Security Vulnerability Disclosure Policy: Details of our current security advisory policy and practice can be found here: https://www.isc.org/security-vulnerability-disclosure-policy Legal Disclaimer: Internet Systems Consortium (ISC) is providing this notice on an "AS IS" basis. No warranty or guarantee of any kind is expressed in this notice and none should be implied. ISC expressly excludes and disclaims any warranties regarding this notice or materials referred to in this notice, including, without limitation, any implied warranty of merchantability, fitness for a particular purpose, absence of hidden defects, or of non-infringement. Your use or reliance on this notice or materials referred to in this notice is at your own risk. ISC may change this notice at any time. A stand-alone copy or paraphrase of the text of this document that omits the document URL is an uncontrolled copy. Uncontrolled copies may lack important information, be out of date, or contain factual errors. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBTuGjne4yVqjM2NGpAQKe6w/+Oo3sGu/dnByBNYsMXfycCKDO0L+O+LCD 4YWrV0XBEvJbckGAc7dyhxHEanQnBrcOlwJ3h4Bz02YgPpFXt8EoELpcVp6vQmzw 28IgHaHvrfzMTXXX4BPOzL0L1GAAP9PLYyykUYFpqv2wnE3+ChuFKOAicNwlw5Bc tc/EU/ZC5mgU07xSXBv+FcihOIbZmd66MADuIVqyQGXPUVSZAe1wf4WSv1cKkGcb j1AUzmkipwtM1AzUuCmcrnmmGCtjLF8UpjKXkSQzFirLeIBKGwPC1fC0VFdnakxX Sb9h7tWoZ7BGundfTlnzQWlRRWU0hjdP/EJWLgC32joos8XkFiXKhAIlgkwglyna qNCp4x3pFvWccC1PGrBUQ4OOzjZoPzuvQ0GoN+GAVQUfqquNCehvtVen1Ae5/PoB YGYRKSOqtxdtrvnRIIfNh7VNLrgzfGu0ZBSAZQE5KEyw8l61GAjZgPNga1NiLzZh KYZmoWny0gr9UKMfHl1T/bK/yexbYq4xh91yCcoIsLh9oAn8gSBMbpIuFDKYH603 1uTePnaPMjYC4p4J9+vWUKakFw0DYuDHLPqp97avENLCFvhOkOycGAr8s7Jnga5P tJCR6i7zku526DAwnP82EKtUthKe7vhHchGoSOAfLngVXAdRoQaDLX6zPYAmh1gd IYgf8yIRa+0= =TSJo -----END PGP SIGNATURE-----