CVE-2021-25217

Summary

CVECVE-2021-25217
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2021-05-26 22:15:00 UTC
Updated2023-11-07 03:31:00 UTC
DescriptionIn ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 (Other branches of ISC DHCP (i.e., releases in the 4.0.x series or lower and releases in the 4.3.x series) are beyond their End-of-Life (EOL) and no longer supported by ISC. From inspection it is clear that the defect is also present in releases from those series, but they have not been officially tested for the vulnerability), The outcome of encountering the defect while reading a lease that will trigger it varies, according to: the component being affected (i.e., dhclient or dhcpd) whether the package was built as a 32-bit or 64-bit binary whether the compiler flag -fstack-protection-strong was used when compiling In dhclient, ISC has not successfully reproduced the error on a 64-bit system. However, on a 32-bit system it is possible to cause dhclient to crash when reading an improper lease, which could cause network connectivity problems for an affected system due to the absence of a running DHCP client process. In dhcpd, when run in DHCPv4 or DHCPv6 mode: if the dhcpd server binary was built for a 32-bit architecture AND the -fstack-protection-strong flag was specified to the compiler, dhcpd may exit while parsing a lease file containing an objectionable lease, resulting in lack of service to clients. Additionally, the offending lease and the lease immediately following it in the lease database may be improperly deleted. if the dhcpd server binary was built for a 64-bit architecture OR if the -fstack-protection-strong compiler flag was NOT specified, the crash will not occur, but it is possible for the offending lease and the lease which immediately followed it to be improperly deleted.

Risk And Classification

Problem Types: CWE-119

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Debian Debian Linux 9.0 All All All
Operating System Fedoraproject Fedora 33 All All All
Operating System Fedoraproject Fedora 34 All All All
Application Isc Dhcp 4.1-esv r1 All All
Application Isc Dhcp 4.1-esv r10 All All
Application Isc Dhcp 4.1-esv r10b1 All All
Application Isc Dhcp 4.1-esv r10rc1 All All
Application Isc Dhcp 4.1-esv r10_b1 All All
Application Isc Dhcp 4.1-esv r10_rc1 All All
Application Isc Dhcp 4.1-esv r11 All All
Application Isc Dhcp 4.1-esv r11b1 All All
Application Isc Dhcp 4.1-esv r11rc1 All All
Application Isc Dhcp 4.1-esv r11rc2 All All
Application Isc Dhcp 4.1-esv r11_b1 All All
Application Isc Dhcp 4.1-esv r11_rc1 All All
Application Isc Dhcp 4.1-esv r11_rc2 All All
Application Isc Dhcp 4.1-esv r12 All All
Application Isc Dhcp 4.1-esv r12-p1 All All
Application Isc Dhcp 4.1-esv r12b1 All All
Application Isc Dhcp 4.1-esv r12_b1 All All
Application Isc Dhcp 4.1-esv r12_p1 All All
Application Isc Dhcp 4.1-esv r13 All All
Application Isc Dhcp 4.1-esv r13b1 All All
Application Isc Dhcp 4.1-esv r13_b1 All All
Application Isc Dhcp 4.1-esv r14 All All
Application Isc Dhcp 4.1-esv r14b1 All All
Application Isc Dhcp 4.1-esv r14_b1 All All
Application Isc Dhcp 4.1-esv r15 All All
Application Isc Dhcp 4.1-esv r15-p1 All All
Application Isc Dhcp 4.1-esv r15_b1 All All
Application Isc Dhcp 4.1-esv r16 All All
Application Isc Dhcp All All All All
Application Netapp Ontap Select Deploy Administration Utility - All All All
Application Netapp Solidfire Hci Management Node - All All All
Hardware Siemens Ruggedcom Rox Mx5000 - All All All
Operating System Siemens Ruggedcom Rox Mx5000 Firmware All All All All
Hardware Siemens Ruggedcom Rox Rx1400 - All All All
Operating System Siemens Ruggedcom Rox Rx1400 Firmware All All All All
Hardware Siemens Ruggedcom Rox Rx1500 - All All All
Operating System Siemens Ruggedcom Rox Rx1500 Firmware All All All All
Hardware Siemens Ruggedcom Rox Rx1501 - All All All
Operating System Siemens Ruggedcom Rox Rx1501 Firmware All All All All
Hardware Siemens Ruggedcom Rox Rx1510 - All All All
Operating System Siemens Ruggedcom Rox Rx1510 Firmware All All All All
Hardware Siemens Ruggedcom Rox Rx1511 - All All All
Operating System Siemens Ruggedcom Rox Rx1511 Firmware All All All All
Hardware Siemens Ruggedcom Rox Rx1512 - All All All
Operating System Siemens Ruggedcom Rox Rx1512 Firmware All All All All
Hardware Siemens Ruggedcom Rox Rx1524 - All All All
Operating System Siemens Ruggedcom Rox Rx1524 Firmware All All All All
Hardware Siemens Ruggedcom Rox Rx1536 - All All All
Operating System Siemens Ruggedcom Rox Rx1536 Firmware All All All All
Hardware Siemens Ruggedcom Rox Rx5000 - All All All
Operating System Siemens Ruggedcom Rox Rx5000 Firmware All All All All
Application Siemens Sinec Ins All All All All
Application Siemens Sinec Ins 1.0 - All All
Application Siemens Sinec Ins 1.0 sp1 All All

References

ReferenceSourceLinkTags
cert-portal.siemens.com/productcert/pdf/ssa-406691.pdf CONFIRM cert-portal.siemens.com
[SECURITY] Fedora 33 Update: dhcp-4.4.2-9.b1.fc33 - package-announce - Fedora Mailing-Lists lists.fedoraproject.org
ISC DHCP: Multiple Vulnerabilities (GLSA 202305-22) — Gentoo security GENTOO security.gentoo.org
oss-security - ISC has disclosed a vulnerability in ISC DHCP (CVE-2021-25217) MLIST www.openwall.com
cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf CONFIRM cert-portal.siemens.com
[SECURITY] Fedora 33 Update: dhcp-4.4.2-9.b1.fc33 - package-announce - Fedora Mailing-Lists FEDORA lists.fedoraproject.org
[SECURITY] Fedora 34 Update: dhcp-4.4.2-11.b1.fc34 - package-announce - Fedora Mailing-Lists FEDORA lists.fedoraproject.org
[SECURITY] [DLA 2674-1] isc-dhcp security update MLIST lists.debian.org
CVE-2021-25217: A buffer overrun in lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient - Security Advisories CONFIRM kb.isc.org
[SECURITY] Fedora 34 Update: dhcp-4.4.2-11.b1.fc34 - package-announce - Fedora Mailing-Lists lists.fedoraproject.org
CVE-2021-25217 ISC DHCP Vulnerability in NetApp Products | NetApp Product Security CONFIRM security.netapp.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Vendor Comments And Credit

Discovery Credit

LEGACY: ISC would like to thank Jon Franklin from Dell and Pawel Wieczorkiewicz from Amazon Web Services for (independently) reporting this vulnerability.

Legacy QID Mappings

  • 159263 Oracle Enterprise Linux Security Update for dhcp (ELSA-2021-2357)
  • 159264 Oracle Enterprise Linux Security Update for dhcp (ELSA-2021-2359)
  • 159281 Oracle Enterprise Linux Security Update for dhcp (ELSA-2021-9314)
  • 178656 Debian Security Update for isc-dhcp (DLA 2674-1)
  • 179913 Debian Security Update for isc-dhcp (CVE-2021-25217)
  • 198388 Ubuntu Security Notification for DHCP vulnerability (USN-4969-1)
  • 239391 Red Hat Update for dhcp (RHSA-2021:2359)
  • 239392 Red Hat Update for dhcp (RHSA-2021:2357)
  • 239430 Red Hat Update for dhcp (RHSA-2021:2420)
  • 239432 Red Hat Update for dhcp (RHSA-2021:2416)
  • 239433 Red Hat Update for dhcp (RHSA-2021:2405)
  • 239490 Red Hat Update for OpenShift Container Platform 4.7.19 (RHSA-2021:2555)
  • 257090 CentOS Security Update for dhcp (CESA-2021:2357)
  • 281493 Fedora Security Update for dhcp (FEDORA-2021-8ca8263bde)
  • 281494 Fedora Security Update for dhcp (FEDORA-2021-08cdb4dc34)
  • 296059 Oracle Solaris 11.4 Support Repository Update (SRU) 36.0.1.101.2 Missing (CPUJUL2021)
  • 352401 Amazon Linux Security Advisory for dhcp: ALAS2-2021-1654
  • 352481 Amazon Linux Security Advisory for dhcp: ALAS-2021-1510
  • 352819 Amazon Linux Security Advisory for dhcp: AL2012-2021-343
  • 377126 Alibaba Cloud Linux Security Update for dhcp (ALINUX3-SA-2021:0041)
  • 377190 Alibaba Cloud Linux Security Update for dhcp (ALINUX2-SA-2021:0039)
  • 390229 Oracle Managed Virtualization (VM) Server for x86 Security Update for dhcp (OVMSA-2021-0018)
  • 500146 Alpine Linux Security Update for dhcp
  • 503796 Alpine Linux Security Update for dhcp
  • 591236 Siemens RUGGEDCOM ROX products DHCP function Buffer Vulnerability (SSA-406691)
  • 591311 Bosch Rexroth PRA-ES8P2S Ethernet-Switch Multiple Vulnerabilities (BOSCH-SA-247053-BT)
  • 670483 EulerOS Security Update for dhcp (EulerOS-SA-2021-2241)
  • 670509 EulerOS Security Update for dhcp (EulerOS-SA-2021-2267)
  • 670533 EulerOS Security Update for dhcp (EulerOS-SA-2021-2291)
  • 670568 EulerOS Security Update for dhcp (EulerOS-SA-2021-2326)
  • 670607 EulerOS Security Update for dhcp (EulerOS-SA-2021-2365)
  • 671143 EulerOS Security Update for dhcp (EulerOS-SA-2021-2578)
  • 690119 Free Berkeley Software Distribution (FreeBSD) Security Update for isc-dhcp (e24fb8f8-c39a-11eb-9370-b42e99a1b9c3)
  • 710726 Gentoo Linux ISC DHCP Multiple Vulnerabilities (GLSA 202305-22)
  • 730155 McAfee Web Gateway Multiple Vulnerabilities(WP-3580, WP-3656, WP-3815, WP-3878, WP-3882, WP-3934,WP-3935, WP-3936, WP-3999)
  • 750089 SUSE Enterprise Linux Security Update for dhcp (SUSE-SU-2021:1822-1)
  • 750096 SUSE Enterprise Linux Security Update for dhcp (SUSE-SU-2021:1841-1)
  • 750176 OpenSUSE Security Update for dhcp (openSUSE-SU-2021:0834-1)
  • 750786 OpenSUSE Security Update for dhcp (openSUSE-SU-2021:1841-1)
  • 770072 Red Hat OpenShift Container Platform 4.7 Security Update (RHSA-2021:2555)
  • 770103 Red Hat OpenShift Container Platform 4.7 Security Update (RHSA-2021-2555)
  • 900166 CBL-Mariner Linux Security Update for dhcp 4.4.2
  • 901784 Common Base Linux Mariner (CBL-Mariner) Security Update for dhcp (6372-1)
  • 903010 Common Base Linux Mariner (CBL-Mariner) Security Update for dhcp (4325)
  • 940346 AlmaLinux Security Update for dhcp (ALSA-2021:2359)
  • 960039 Rocky Linux Security Update for dhcp (RLSA-2021:2359)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report