CVE-2012-3571
Summary
| CVE | CVE-2012-3571 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2012-07-25 10:42:00 UTC |
| Updated | 2020-04-01 13:58:00 UTC |
| Description | ISC DHCP 4.1.2 through 4.2.4 and 4.1-ESV before 4.1-ESV-R6 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed client identifier. |
Risk And Classification
Problem Types: CWE-119
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Canonical | Ubuntu Linux | 11.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 11.10 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 12.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 11.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 11.10 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 12.04 | All | All | All |
| Operating System | Debian | Debian Linux | 6.0 | All | All | All |
| Operating System | Debian | Debian Linux | 7.0 | All | All | All |
| Operating System | Debian | Debian Linux | 6.0 | All | All | All |
| Operating System | Debian | Debian Linux | 7.0 | All | All | All |
| Application | Isc | Dhcp | 4.1-esv | - | All | All |
| Application | Isc | Dhcp | 4.1-esv | r1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r2 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r3 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r3_b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r4 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r5 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r5_b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r5_rc1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r5_rc2 | All | All |
| Application | Isc | Dhcp | 4.1.2 | All | All | All |
| Application | Isc | Dhcp | 4.2.0 | - | All | All |
| Application | Isc | Dhcp | 4.2.0 | a1 | All | All |
| Application | Isc | Dhcp | 4.2.0 | a2 | All | All |
| Application | Isc | Dhcp | 4.2.0 | b1 | All | All |
| Application | Isc | Dhcp | 4.2.0 | b2 | All | All |
| Application | Isc | Dhcp | 4.2.0 | p1 | All | All |
| Application | Isc | Dhcp | 4.2.0 | rc1 | All | All |
| Application | Isc | Dhcp | 4.2.1 | - | All | All |
| Application | Isc | Dhcp | 4.2.1 | b1 | All | All |
| Application | Isc | Dhcp | 4.2.1 | rc1 | All | All |
| Application | Isc | Dhcp | 4.2.2 | - | All | All |
| Application | Isc | Dhcp | 4.2.2 | b1 | All | All |
| Application | Isc | Dhcp | 4.2.2 | rc1 | All | All |
| Application | Isc | Dhcp | 4.2.3 | - | All | All |
| Application | Isc | Dhcp | 4.2.3 | p1 | All | All |
| Application | Isc | Dhcp | 4.2.3 | p2 | All | All |
| Application | Isc | Dhcp | 4.2.4 | All | All | All |
| Application | Isc | Dhcp | 4.1-esv | - | All | All |
| Application | Isc | Dhcp | 4.1-esv | r1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r2 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r3 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r3_b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r4 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r5 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r5_b1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r5_rc1 | All | All |
| Application | Isc | Dhcp | 4.1-esv | r5_rc2 | All | All |
| Application | Isc | Dhcp | 4.1.2 | All | All | All |
| Application | Isc | Dhcp | 4.2.0 | - | All | All |
| Application | Isc | Dhcp | 4.2.0 | a1 | All | All |
| Application | Isc | Dhcp | 4.2.0 | a2 | All | All |
| Application | Isc | Dhcp | 4.2.0 | b1 | All | All |
| Application | Isc | Dhcp | 4.2.0 | b2 | All | All |
| Application | Isc | Dhcp | 4.2.0 | p1 | All | All |
| Application | Isc | Dhcp | 4.2.0 | rc1 | All | All |
| Application | Isc | Dhcp | 4.2.1 | - | All | All |
| Application | Isc | Dhcp | 4.2.1 | b1 | All | All |
| Application | Isc | Dhcp | 4.2.1 | rc1 | All | All |
| Application | Isc | Dhcp | 4.2.2 | - | All | All |
| Application | Isc | Dhcp | 4.2.2 | b1 | All | All |
| Application | Isc | Dhcp | 4.2.2 | rc1 | All | All |
| Application | Isc | Dhcp | 4.2.3 | - | All | All |
| Application | Isc | Dhcp | 4.2.3 | p1 | All | All |
| Application | Isc | Dhcp | 4.2.3 | p2 | All | All |
| Application | Isc | Dhcp | 4.2.4 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| USN-1519-1: DHCP vulnerabilities | Ubuntu | UBUNTU | www.ubuntu.com | Third Party Advisory |
| ISC DHCP Multiple Denial of Service Vulnerabilities | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| openSUSE-SU-2012:1006-1: moderate: update for dhcp | SUSE | lists.opensuse.org | Mailing List, Third Party Advisory |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | Third Party Advisory |
| Support / Security / Advisories / / MDVSA-2012:116 | Mandriva | MANDRIVA | www.mandriva.com | Third Party Advisory |
| Support / Security / Advisories / / MDVSA-2012:115 | Mandriva | MANDRIVA | www.mandriva.com | Third Party Advisory |
| CVE-2012-3571: An Error in the Handling of Malformed Client Identifiers can Cause a Denial-of-Service Condition in Affected Servers | Internet Systems Consortium Knowledge Base | CONFIRM | kb.isc.org | Vendor Advisory |
| Oracle VM Server for x86 Bulletin - July 2016 | CONFIRM | www.oracle.com | Third Party Advisory |
| Debian -- Security Information -- DSA-2519-2 isc-dhcp | DEBIAN | www.debian.org | Third Party Advisory |
| 2016-10 Security Bulletin: CTPView: Multiple vulnerabilities in CTPView - Juniper Networks | CONFIRM | kb.juniper.net | Third Party Advisory |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | Third Party Advisory |
| Gentoo Linux Documentation -- ISC DHCP: Denial of Service | GENTOO | security.gentoo.org | Third Party Advisory |
| Debian -- Security Information -- DSA-2516-1 isc-dhcp | DEBIAN | www.debian.org | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.