The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

vulnerability bulletin CVE-2015-8605

ISC DHCP: buffer overflow of decode_udp_ip_header

Synthesis of the vulnerability

An attacker can generate a buffer overflow by sending an IPv4+UDP packet to an ISC DHCP client or server, in order to trigger a denial of service, and possibly to run code.
Severity of this alert: 3/4.
Creation date: 13/01/2016.
Références of this alert: AA-01334, ARUBA-PSA-2016-007, CERTFR-2016-AVI-167, CVE-2015-8605, DSA-2019-131, DSA-3442-1, FEDORA-2016-0c5bb21bf1, FEDORA-2016-adb533a418, openSUSE-SU-2016:0601-1, openSUSE-SU-2016:0610-1, SOL57500018, SSA:2016-012-01, STORM-2015-018, USN-2868-1, VIGILANCE-VUL-18707.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The DHCP protocol uses UDP packets.

The decode_udp_ip_header() function of the common/packet.c file of ISC DHCP decodes these UDP packets. However, if the size indicated in the IPv4 header for UDP data is too large, an overflow occurs.

An attacker can therefore generate a buffer overflow by sending an IPv4+UDP packet to an ISC DHCP client or server, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

This security note impacts software or systems such as SNS, ArubaOS, Debian, VNX Operating Environment, VNX Series, BIG-IP Hardware, TMOS, Fedora, ISC DHCP, NETASQ, openSUSE, openSUSE Leap, Slackware, Ubuntu.

Our Vigil@nce team determined that the severity of this threat announce is important.

The trust level is of type confirmed by the editor, with an origin of LAN.

An attacker with a expert ability can exploit this computer weakness announce.

Solutions for this threat

ISC DHCP: version 4.3.3-P1.
The version 4.3.3-P1 is fixed:
  ftp://ftp.isc.org/isc/dhcp/4.3.3-P1/

ISC DHCP: version 4.1-ESV-R12-P1.
The version 4.1-ESV-R12-P1 is fixed:
  ftp://ftp.isc.org/isc/dhcp/4.1-ESV-R12-P1/

ISC DHCP: patch for decode_udp_ip_header.
A patch is indicated in information sources.

ArubaOS: versions 6.3.1.21, 6.4.2.16, 6.4.3.7 and 6.4.4.5.
Versions 6.3.1.21, 6.4.2.16, 6.4.3.7 and 6.4.4.5 are fixed:
  http://www.arubanetworks.com/

Debian: new isc-dhcp packages.
New packages are available:
  Debian 7: isc-dhcp 4.2.2.dfsg.1-5+deb70u8
  Debian 8: isc-dhcp 4.3.1-6+deb8u2

Dell EMC VNXe3200: version 3.1.10.9946299.
The version 3.1.10.9946299 is fixed:
  https://www.dell.com/

F5 BIG-IP: fixed versions for ISC DHCP.
Fixed versions are indicated in information sources.

Fedora: new dhcp packages.
New packages are available:
  Fedora 23: dhcp 4.3.3-8.P1.fc23
  Fedora 22: dhcp 4.3.2-7.fc22

openSUSE: new dhcp packages.
New packages are available:
  openSUSE 13.2: dhcp 4.2.6-9.16.1
  openSUSE Leap 42.1: dhcp 4.3.3-4.1

Slackware: new dhcp packages.
New packages are available:
  Slackware 13.0: dhcp 4.3.3_P1-*-1_slack13.0
  Slackware 13.1: dhcp 4.3.3_P1-*-1_slack13.1
  Slackware 13.37: dhcp 4.3.3_P1-*-1_slack13.37
  Slackware 14.0: dhcp 4.3.3_P1-*-1_slack14.0
  Slackware 14.1: dhcp 4.3.3_P1-*-1_slack14.1

Stormshield: fixed versions for DHCP.
Fixed versions are indicated in information sources.

Ubuntu: new isc-dhcp packages.
New packages are available:
  Ubuntu 15.10: isc-dhcp 4.3.1-5ubuntu3.1
  Ubuntu 15.04: isc-dhcp 4.3.1-5ubuntu2.3
  Ubuntu 14.04 LTS: isc-dhcp 4.2.4-7ubuntu12.4
  Ubuntu 12.04 LTS: isc-dhcp 4.1.ESV-R4-0ubuntu5.10
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides application vulnerability patches. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The technology watch team tracks security threats targeting the computer system. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.