Vulnerability Details : CVE-2016-2774
ISC DHCP 4.1.x before 4.1-ESV-R13 and 4.2.x and 4.3.x before 4.3.4 does not restrict the number of concurrent TCP sessions, which allows remote attackers to cause a denial of service (INSIST assertion failure or request-processing outage) by establishing many sessions.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2016-2774
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1.1:b3:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1.1:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1.1:b2:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1.1:-:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.1:-:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1.0:-:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1.2:-:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1.0:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1.0:a2:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1.0:a1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.2:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.2:-:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.3:-:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.3:p1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.3:p2:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r5_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc2:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1.2:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1.2:p1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.4:p1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r10_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r11_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc2:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r12_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r7:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r8:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r8_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r8_rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r9:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r9_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r9_rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1.1:p1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.0:p2:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.1:p1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.4:-:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.4:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.4:p2:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.4:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.4:rc2:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.5:-:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.5:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.5:p1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.5:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.6:-:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.6:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.6:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.7:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.7:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.8:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.8:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.8:rc2:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.3.0:a1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.3.0:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.3.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.3.1:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.3.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.3.2:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.3.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.3.2:rc2:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.3.3:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.7:-:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.2.8:-:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.3.0:-:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.3.1:-:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.3.2:-:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.3.3:-:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-2774
92.17%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-2774
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.1
|
HIGH | AV:N/AC:M/Au:N/C:N/I:N/A:C |
8.6
|
6.9
|
NIST | |
5.9
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.2
|
3.6
|
NIST |
CWE ids for CVE-2016-2774
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-2774
-
https://lists.debian.org/debian-lts-announce/2019/11/msg00023.html
[SECURITY] [DLA 2003-1] isc-dhcp security updateThird Party Advisory
-
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
Oracle Solaris Bulletin - July 2016Third Party Advisory
-
https://kb.isc.org/article/AA-01354
CVE-2016-2774: An attacker who is allowed to connect to DHCP inter-server communications and control channels can exhaust server resources - Security AdvisoriesVendor Advisory
-
http://lists.opensuse.org/opensuse-updates/2016-07/msg00066.html
openSUSE-SU-2016:1843-1: moderate: Security update for dhcpMailing List;Third Party Advisory
-
http://www.securitytracker.com/id/1035196
DHCP IPC Connection Management Flaw Lets Remote Users on the Local Network Consume Excessive Resources on the Target System - SecurityTrackerThird Party Advisory;VDB Entry
-
http://rhn.redhat.com/errata/RHSA-2016-2590.html
RHSA-2016:2590 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://usn.ubuntu.com/3586-1/
USN-3586-1: DHCP vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183458.html
[SECURITY] Fedora 23 Update: dhcp-4.3.3-9.P1.fc23Third Party Advisory
-
http://www.securityfocus.com/bid/84208
ISC DHCP CVE-2016-2774 Remote Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183640.html
[SECURITY] Fedora 24 Update: dhcp-4.3.4-1.fc24Third Party Advisory
Jump to