CVE-2021-25217

Published on: 05/26/2021 12:00:00 AM UTC

Last Modified on: 10/29/2022 02:48:00 AM UTC

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Certain versions of Debian Linux from Debian contain the following vulnerability:

In ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 (Other branches of ISC DHCP (i.e., releases in the 4.0.x series or lower and releases in the 4.3.x series) are beyond their End-of-Life (EOL) and no longer supported by ISC. From inspection it is clear that the defect is also present in releases from those series, but they have not been officially tested for the vulnerability), The outcome of encountering the defect while reading a lease that will trigger it varies, according to: the component being affected (i.e., dhclient or dhcpd) whether the package was built as a 32-bit or 64-bit binary whether the compiler flag -fstack-protection-strong was used when compiling In dhclient, ISC has not successfully reproduced the error on a 64-bit system. However, on a 32-bit system it is possible to cause dhclient to crash when reading an improper lease, which could cause network connectivity problems for an affected system due to the absence of a running DHCP client process. In dhcpd, when run in DHCPv4 or DHCPv6 mode: if the dhcpd server binary was built for a 32-bit architecture AND the -fstack-protection-strong flag was specified to the compiler, dhcpd may exit while parsing a lease file containing an objectionable lease, resulting in lack of service to clients. Additionally, the offending lease and the lease immediately following it in the lease database may be improperly deleted. if the dhcpd server binary was built for a 64-bit architecture OR if the -fstack-protection-strong compiler flag was NOT specified, the crash will not occur, but it is possible for the offending lease and the lease which immediately followed it to be improperly deleted.

  • CVE-2021-25217 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.
  • We are not aware of any active exploits.
  • Affected Vendor/Software: URL Logo ISC - ISC DHCP version < 4.1-ESV-R16-P1
  • Affected Vendor/Software: URL Logo ISC - ISC DHCP version < 4.4.2-P1
Vulnerability Patch/Work Around
  • None known.

CVSS3 Score: 7.4 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
ADJACENT_NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
CHANGED NONE NONE HIGH

CVSS2 Score: 3.3 - LOW

Access
Vector
Access
Complexity
Authentication
ADJACENT_NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
cert-portal.siemens.com
application/pdf
URL Logo CONFIRM cert-portal.siemens.com/productcert/pdf/ssa-406691.pdf
oss-security - ISC has disclosed a vulnerability in ISC DHCP (CVE-2021-25217) www.openwall.com
text/html
URL Logo MLIST [oss-security] 20210526 ISC has disclosed a vulnerability in ISC DHCP (CVE-2021-25217)
cert-portal.siemens.com
application/pdf
URL Logo CONFIRM cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
[SECURITY] Fedora 33 Update: dhcp-4.4.2-9.b1.fc33 - package-announce - Fedora Mailing-Lists lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2021-8ca8263bde
[SECURITY] Fedora 34 Update: dhcp-4.4.2-11.b1.fc34 - package-announce - Fedora Mailing-Lists lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2021-08cdb4dc34
[SECURITY] [DLA 2674-1] isc-dhcp security update lists.debian.org
text/html
URL Logo MLIST [debian-lts-announce] 20210603 [SECURITY] [DLA 2674-1] isc-dhcp security update
CVE-2021-25217: A buffer overrun in lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient - Security Advisories kb.isc.org
text/html
URL Logo CONFIRM kb.isc.org/docs/cve-2021-25217
CVE-2021-25217 ISC DHCP Vulnerability in NetApp Products | NetApp Product Security security.netapp.com
text/html
URL Logo CONFIRM security.netapp.com/advisory/ntap-20220325-0011/

Related QID Numbers

  • 159263 Oracle Enterprise Linux Security Update for dhcp (ELSA-2021-2357)
  • 159264 Oracle Enterprise Linux Security Update for dhcp (ELSA-2021-2359)
  • 159281 Oracle Enterprise Linux Security Update for dhcp (ELSA-2021-9314)
  • 178656 Debian Security Update for isc-dhcp (DLA 2674-1)
  • 179913 Debian Security Update for isc-dhcp (CVE-2021-25217)
  • 198388 Ubuntu Security Notification for DHCP vulnerability (USN-4969-1)
  • 239391 Red Hat Update for dhcp (RHSA-2021:2359)
  • 239392 Red Hat Update for dhcp (RHSA-2021:2357)
  • 239430 Red Hat Update for dhcp (RHSA-2021:2420)
  • 239432 Red Hat Update for dhcp (RHSA-2021:2416)
  • 239433 Red Hat Update for dhcp (RHSA-2021:2405)
  • 239490 Red Hat Update for OpenShift Container Platform 4.7.19 (RHSA-2021:2555)
  • 257090 CentOS Security Update for dhcp (CESA-2021:2357)
  • 281493 Fedora Security Update for dhcp (FEDORA-2021-8ca8263bde)
  • 281494 Fedora Security Update for dhcp (FEDORA-2021-08cdb4dc34)
  • 296059 Oracle Solaris 11.4 Support Repository Update (SRU) 36.0.1.101.2 Missing (CPUJUL2021)
  • 352401 Amazon Linux Security Advisory for dhcp: ALAS2-2021-1654
  • 352481 Amazon Linux Security Advisory for dhcp: ALAS-2021-1510
  • 352819 Amazon Linux Security Advisory for dhcp: AL2012-2021-343
  • 377126 Alibaba Cloud Linux Security Update for dhcp (ALINUX3-SA-2021:0041)
  • 377190 Alibaba Cloud Linux Security Update for dhcp (ALINUX2-SA-2021:0039)
  • 390229 Oracle Managed Virtualization (VM) Server for x86 Security Update for dhcp (OVMSA-2021-0018)
  • 500146 Alpine Linux Security Update for dhcp
  • 670483 EulerOS Security Update for dhcp (EulerOS-SA-2021-2241)
  • 670509 EulerOS Security Update for dhcp (EulerOS-SA-2021-2267)
  • 670533 EulerOS Security Update for dhcp (EulerOS-SA-2021-2291)
  • 670568 EulerOS Security Update for dhcp (EulerOS-SA-2021-2326)
  • 670607 EulerOS Security Update for dhcp (EulerOS-SA-2021-2365)
  • 671143 EulerOS Security Update for dhcp (EulerOS-SA-2021-2578)
  • 690119 Free Berkeley Software Distribution (FreeBSD) Security Update for isc-dhcp (e24fb8f8-c39a-11eb-9370-b42e99a1b9c3)
  • 730155 McAfee Web Gateway Multiple Vulnerabilities(WP-3580, WP-3656, WP-3815, WP-3878, WP-3882, WP-3934,WP-3935, WP-3936, WP-3999)
  • 750089 SUSE Enterprise Linux Security Update for dhcp (SUSE-SU-2021:1822-1)
  • 750096 SUSE Enterprise Linux Security Update for dhcp (SUSE-SU-2021:1841-1)
  • 750176 OpenSUSE Security Update for dhcp (openSUSE-SU-2021:0834-1)
  • 750786 OpenSUSE Security Update for dhcp (openSUSE-SU-2021:1841-1)
  • 770072 Red Hat OpenShift Container Platform 4.7 Security Update (RHSA-2021:2555)
  • 770103 Red Hat OpenShift Container Platform 4.7 Security Update (RHSA-2021-2555)
  • 900166 CBL-Mariner Linux Security Update for dhcp 4.4.2
  • 901784 Common Base Linux Mariner (CBL-Mariner) Security Update for dhcp (6372-1)
  • 903010 Common Base Linux Mariner (CBL-Mariner) Security Update for dhcp (4325)
  • 940346 AlmaLinux Security Update for dhcp (ALSA-2021:2359)
  • 960039 Rocky Linux Security Update for dhcp (RLSA-2021:2359)

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
DebianDebian Linux9.0AllAllAll
Operating
System
FedoraprojectFedora33AllAllAll
Operating
System
FedoraprojectFedora34AllAllAll
ApplicationIscDhcp4.1-esvr1AllAll
ApplicationIscDhcp4.1-esvr10AllAll
ApplicationIscDhcp4.1-esvr10b1AllAll
ApplicationIscDhcp4.1-esvr10rc1AllAll
ApplicationIscDhcp4.1-esvr10_b1AllAll
ApplicationIscDhcp4.1-esvr10_rc1AllAll
ApplicationIscDhcp4.1-esvr11AllAll
ApplicationIscDhcp4.1-esvr11b1AllAll
ApplicationIscDhcp4.1-esvr11rc1AllAll
ApplicationIscDhcp4.1-esvr11rc2AllAll
ApplicationIscDhcp4.1-esvr11_b1AllAll
ApplicationIscDhcp4.1-esvr11_rc1AllAll
ApplicationIscDhcp4.1-esvr11_rc2AllAll
ApplicationIscDhcp4.1-esvr12AllAll
ApplicationIscDhcp4.1-esvr12-p1AllAll
ApplicationIscDhcp4.1-esvr12b1AllAll
ApplicationIscDhcp4.1-esvr12_b1AllAll
ApplicationIscDhcp4.1-esvr12_p1AllAll
ApplicationIscDhcp4.1-esvr13AllAll
ApplicationIscDhcp4.1-esvr13b1AllAll
ApplicationIscDhcp4.1-esvr13_b1AllAll
ApplicationIscDhcp4.1-esvr14AllAll
ApplicationIscDhcp4.1-esvr14b1AllAll
ApplicationIscDhcp4.1-esvr14_b1AllAll
ApplicationIscDhcp4.1-esvr15AllAll
ApplicationIscDhcp4.1-esvr15-p1AllAll
ApplicationIscDhcp4.1-esvr15_b1AllAll
ApplicationIscDhcp4.1-esvr16AllAll
ApplicationIscDhcpAllAllAllAll
ApplicationNetappOntap Select Deploy Administration Utility-AllAllAll
ApplicationNetappSolidfire Hci Management Node-AllAllAll
Hardware Device InfoSiemensRuggedcom Rox Mx5000-AllAllAll
Operating
System
SiemensRuggedcom Rox Mx5000 FirmwareAllAllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx1400-AllAllAll
Operating
System
SiemensRuggedcom Rox Rx1400 FirmwareAllAllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx1500-AllAllAll
Operating
System
SiemensRuggedcom Rox Rx1500 FirmwareAllAllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx1501-AllAllAll
Operating
System
SiemensRuggedcom Rox Rx1501 FirmwareAllAllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx1510-AllAllAll
Operating
System
SiemensRuggedcom Rox Rx1510 FirmwareAllAllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx1511-AllAllAll
Operating
System
SiemensRuggedcom Rox Rx1511 FirmwareAllAllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx1512-AllAllAll
Operating
System
SiemensRuggedcom Rox Rx1512 FirmwareAllAllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx1524-AllAllAll
Operating
System
SiemensRuggedcom Rox Rx1524 FirmwareAllAllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx1536-AllAllAll
Operating
System
SiemensRuggedcom Rox Rx1536 FirmwareAllAllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx5000-AllAllAll
Operating
System
SiemensRuggedcom Rox Rx5000 FirmwareAllAllAllAll
ApplicationSiemensSinec InsAllAllAllAll
ApplicationSiemensSinec Ins1.0-AllAll
ApplicationSiemensSinec Ins1.0sp1AllAll
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*:
  • cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r10b1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r10rc1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r10_b1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r10_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r11:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r11b1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r11rc1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r11rc2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r11_b1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r12-p1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r12b1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r12_b1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r12_p1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r13:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r13b1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r13_b1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r14:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r14b1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r14_b1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r15:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r15-p1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r15_b1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:4.1-esv:r16:*:*:*:*:*:*:
  • cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*:
  • cpe:2.3:a:netapp:solidfire_\&_hci_management_node:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_mx5000:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_mx5000_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx1400:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx1400_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx1500:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx1500_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx1501:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx1501_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx1510:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx1510_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx1511:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx1511_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx1512:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx1512_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx1524:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx1524_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx1536:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx1536_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx5000:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx5000_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*:
  • cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:*:

Discovery Credit

ISC would like to thank Jon Franklin from Dell and Pawel Wieczorkiewicz from Amazon Web Services for (independently) reporting this vulnerability.

Social Mentions

Source Title Posted (UTC)
Twitter Icon @OpenBSD_ports [email protected] modified net/isc-dhcp: update to isc-dhcp-4.4.2-P1 CVE-2021-25217: A buffer overrun in lease file parsing co… twitter.com/i/web/status/1… 2021-05-26 21:55:20
Twitter Icon @OpenBSD_ports OPENBSD_6_9 [email protected] modified net/isc-dhcp: update to isc-dhcp-4.4.2-P1 CVE-2021-25217: A buffer overrun in lease fil… twitter.com/i/web/status/1… 2021-05-26 21:55:21
Twitter Icon @OpenBSD_stable OPENBSD_6_9 [email protected] modified net/isc-dhcp: update to isc-dhcp-4.4.2-P1 CVE-2021-25217: A buffer overrun in lease fil… twitter.com/i/web/status/1… 2021-05-26 21:55:21
Twitter Icon @CVEreport CVE-2021-25217 : In ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 Other branches of ISC DHCP i.e.,… twitter.com/i/web/status/1… 2021-05-26 22:18:56
Twitter Icon @netbsdsrc christos: CVE: CVE-2021-25217 2021-05-26 22:49:09
Twitter Icon @bsdaemon Nice finding @wipawel (kb.isc.org/docs/cve-2021-…)! A reminder that the F2 team is still hiring @JacobTorrey… twitter.com/i/web/status/1… 2021-05-27 00:04:42
Reddit Logo Icon /r/netcve CVE-2021-25217 2021-05-26 22:41:46
Reddit Logo Icon /r/synology DSM Version: 7.1.1-42951 (Release Candidate) 2022-08-10 06:07:14
Reddit Logo Icon /r/synology Has anyone seen the release notes for the latest DSM 7.1.1 Release Candidate. Fixes a scary amount of CVEs. 2022-08-16 14:26:29
Reddit Logo Icon /r/synology DSM 7.1.1-42962 released! 2022-09-05 11:39:36
© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report