The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of ISC DHCP: buffer overflow of decode_udp_ip_header

Synthesis of the vulnerability 

An attacker can generate a buffer overflow by sending an IPv4+UDP packet to an ISC DHCP client or server, in order to trigger a denial of service, and possibly to run code.
Impacted systems: SNS, ArubaOS, Debian, VNX Operating Environment, VNX Series, BIG-IP Hardware, TMOS, Fedora, ISC DHCP, NETASQ, openSUSE, openSUSE Leap, Slackware, Ubuntu.
Severity of this alert: 3/4.
Creation date: 13/01/2016.
Références of this alert: AA-01334, ARUBA-PSA-2016-007, CERTFR-2016-AVI-167, CVE-2015-8605, DSA-2019-131, DSA-3442-1, FEDORA-2016-0c5bb21bf1, FEDORA-2016-adb533a418, openSUSE-SU-2016:0601-1, openSUSE-SU-2016:0610-1, SOL57500018, SSA:2016-012-01, STORM-2015-018, USN-2868-1, VIGILANCE-VUL-18707.

Description of the vulnerability 

The DHCP protocol uses UDP packets.

The decode_udp_ip_header() function of the common/packet.c file of ISC DHCP decodes these UDP packets. However, if the size indicated in the IPv4 header for UDP data is too large, an overflow occurs.

An attacker can therefore generate a buffer overflow by sending an IPv4+UDP packet to an ISC DHCP client or server, in order to trigger a denial of service, and possibly to run code.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This security note impacts software or systems such as SNS, ArubaOS, Debian, VNX Operating Environment, VNX Series, BIG-IP Hardware, TMOS, Fedora, ISC DHCP, NETASQ, openSUSE, openSUSE Leap, Slackware, Ubuntu.

Our Vigil@nce team determined that the severity of this threat announce is important.

The trust level is of type confirmed by the editor, with an origin of LAN.

An attacker with a expert ability can exploit this computer weakness announce.

Solutions for this threat 

ISC DHCP: version 4.3.3-P1.
The version 4.3.3-P1 is fixed:
  ftp://ftp.isc.org/isc/dhcp/4.3.3-P1/

ISC DHCP: version 4.1-ESV-R12-P1.
The version 4.1-ESV-R12-P1 is fixed:
  ftp://ftp.isc.org/isc/dhcp/4.1-ESV-R12-P1/

ISC DHCP: patch for decode_udp_ip_header.
A patch is indicated in information sources.

ArubaOS: versions 6.3.1.21, 6.4.2.16, 6.4.3.7 and 6.4.4.5.
Versions 6.3.1.21, 6.4.2.16, 6.4.3.7 and 6.4.4.5 are fixed:
  http://www.arubanetworks.com/

Debian: new isc-dhcp packages.
New packages are available:
  Debian 7: isc-dhcp 4.2.2.dfsg.1-5+deb70u8
  Debian 8: isc-dhcp 4.3.1-6+deb8u2

Dell EMC VNXe3200: version 3.1.10.9946299.
The version 3.1.10.9946299 is fixed:
  https://www.dell.com/

F5 BIG-IP: fixed versions for ISC DHCP.
Fixed versions are indicated in information sources.

Fedora: new dhcp packages.
New packages are available:
  Fedora 23: dhcp 4.3.3-8.P1.fc23
  Fedora 22: dhcp 4.3.2-7.fc22

openSUSE: new dhcp packages.
New packages are available:
  openSUSE 13.2: dhcp 4.2.6-9.16.1
  openSUSE Leap 42.1: dhcp 4.3.3-4.1

Slackware: new dhcp packages.
New packages are available:
  Slackware 13.0: dhcp 4.3.3_P1-*-1_slack13.0
  Slackware 13.1: dhcp 4.3.3_P1-*-1_slack13.1
  Slackware 13.37: dhcp 4.3.3_P1-*-1_slack13.37
  Slackware 14.0: dhcp 4.3.3_P1-*-1_slack14.0
  Slackware 14.1: dhcp 4.3.3_P1-*-1_slack14.1

Stormshield: fixed versions for DHCP.
Fixed versions are indicated in information sources.

Ubuntu: new isc-dhcp packages.
New packages are available:
  Ubuntu 15.10: isc-dhcp 4.3.1-5ubuntu3.1
  Ubuntu 15.04: isc-dhcp 4.3.1-5ubuntu2.3
  Ubuntu 14.04 LTS: isc-dhcp 4.2.4-7ubuntu12.4
  Ubuntu 12.04 LTS: isc-dhcp 4.1.ESV-R4-0ubuntu5.10
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides application vulnerability patches. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.