CVE-2021-25217
Published on: 05/26/2021 12:00:00 AM UTC
Last Modified on: 05/13/2022 08:47:00 PM UTC
Certain versions of Debian Linux from Debian contain the following vulnerability:
In ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 (Other branches of ISC DHCP (i.e., releases in the 4.0.x series or lower and releases in the 4.3.x series) are beyond their End-of-Life (EOL) and no longer supported by ISC. From inspection it is clear that the defect is also present in releases from those series, but they have not been officially tested for the vulnerability), The outcome of encountering the defect while reading a lease that will trigger it varies, according to: the component being affected (i.e., dhclient or dhcpd) whether the package was built as a 32-bit or 64-bit binary whether the compiler flag -fstack-protection-strong was used when compiling In dhclient, ISC has not successfully reproduced the error on a 64-bit system. However, on a 32-bit system it is possible to cause dhclient to crash when reading an improper lease, which could cause network connectivity problems for an affected system due to the absence of a running DHCP client process. In dhcpd, when run in DHCPv4 or DHCPv6 mode: if the dhcpd server binary was built for a 32-bit architecture AND the -fstack-protection-strong flag was specified to the compiler, dhcpd may exit while parsing a lease file containing an objectionable lease, resulting in lack of service to clients. Additionally, the offending lease and the lease immediately following it in the lease database may be improperly deleted. if the dhcpd server binary was built for a 64-bit architecture OR if the -fstack-protection-strong compiler flag was NOT specified, the crash will not occur, but it is possible for the offending lease and the lease which immediately followed it to be improperly deleted.
- CVE-2021-25217 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
- We are not aware of any active exploits.
- Affected Vendor/Software:
ISC - ISC DHCP version < 4.1-ESV-R16-P1
- Affected Vendor/Software:
ISC - ISC DHCP version < 4.4.2-P1
- None known.
CVSS3 Score: 7.4 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
ADJACENT_NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
CHANGED | NONE | NONE | HIGH |
CVSS2 Score: 3.3 - LOW
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
ADJACENT_NETWORK | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | NONE | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
cert-portal.siemens.com application/pdf |
![]() | |
oss-security - ISC has disclosed a vulnerability in ISC DHCP (CVE-2021-25217) | www.openwall.com text/html |
![]() |
[SECURITY] Fedora 33 Update: dhcp-4.4.2-9.b1.fc33 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org text/html |
![]() |
[SECURITY] Fedora 34 Update: dhcp-4.4.2-11.b1.fc34 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org text/html |
![]() |
[SECURITY] [DLA 2674-1] isc-dhcp security update | lists.debian.org text/html |
![]() |
CVE-2021-25217: A buffer overrun in lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient - Security Advisories | kb.isc.org text/html |
![]() |
CVE-2021-25217 ISC DHCP Vulnerability in NetApp Products | NetApp Product Security | security.netapp.com text/html |
![]() |
Related QID Numbers
- 159263 Oracle Enterprise Linux Security Update for dhcp (ELSA-2021-2357)
- 159264 Oracle Enterprise Linux Security Update for dhcp (ELSA-2021-2359)
- 159281 Oracle Enterprise Linux Security Update for dhcp (ELSA-2021-9314)
- 178656 Debian Security Update for isc-dhcp (DLA 2674-1)
- 179913 Debian Security Update for isc-dhcp (CVE-2021-25217)
- 198388 Ubuntu Security Notification for DHCP vulnerability (USN-4969-1)
- 239391 Red Hat Update for dhcp (RHSA-2021:2359)
- 239392 Red Hat Update for dhcp (RHSA-2021:2357)
- 239430 Red Hat Update for dhcp (RHSA-2021:2420)
- 239432 Red Hat Update for dhcp (RHSA-2021:2416)
- 239433 Red Hat Update for dhcp (RHSA-2021:2405)
- 239490 Red Hat Update for OpenShift Container Platform 4.7.19 (RHSA-2021:2555)
- 257090 CentOS Security Update for dhcp (CESA-2021:2357)
- 281493 Fedora Security Update for dhcp (FEDORA-2021-8ca8263bde)
- 281494 Fedora Security Update for dhcp (FEDORA-2021-08cdb4dc34)
- 352401 Amazon Linux Security Advisory for dhcp: ALAS2-2021-1654
- 352481 Amazon Linux Security Advisory for dhcp: ALAS-2021-1510
- 352819 Amazon Linux Security Advisory for dhcp: AL2012-2021-343
- 390229 Oracle Managed Virtualization (VM) Server for x86 Security Update for dhcp (OVMSA-2021-0018)
- 500146 Alpine Linux Security Update for dhcp
- 670483 EulerOS Security Update for dhcp (EulerOS-SA-2021-2241)
- 670509 EulerOS Security Update for dhcp (EulerOS-SA-2021-2267)
- 670533 EulerOS Security Update for dhcp (EulerOS-SA-2021-2291)
- 670568 EulerOS Security Update for dhcp (EulerOS-SA-2021-2326)
- 670607 EulerOS Security Update for dhcp (EulerOS-SA-2021-2365)
- 671143 EulerOS Security Update for dhcp (EulerOS-SA-2021-2578)
- 690119 Free Berkeley Software Distribution (FreeBSD) Security Update for isc-dhcp (e24fb8f8-c39a-11eb-9370-b42e99a1b9c3)
- 730155 McAfee Web Gateway Multiple Vulnerabilities(WP-3580, WP-3656, WP-3815, WP-3878, WP-3882, WP-3934,WP-3935, WP-3936, WP-3999)
- 750089 SUSE Enterprise Linux Security Update for dhcp (SUSE-SU-2021:1822-1)
- 750096 SUSE Enterprise Linux Security Update for dhcp (SUSE-SU-2021:1841-1)
- 750176 OpenSUSE Security Update for dhcp (openSUSE-SU-2021:0834-1)
- 750786 OpenSUSE Security Update for dhcp (openSUSE-SU-2021:1841-1)
- 770072 Red Hat OpenShift Container Platform 4.7 Security Update (RHSA-2021:2555)
- 770103 Red Hat OpenShift Container Platform 4.7 Security Update (RHSA-2021-2555)
- 900166 CBL-Mariner Linux Security Update for dhcp 4.4.2
- 901784 Common Base Linux Mariner (CBL-Mariner) Security Update for dhcp (6372-1)
- 940346 AlmaLinux Security Update for dhcp (ALSA-2021:2359)
- 960039 Rocky Linux Security Update for dhcp (RLSA-2021:2359)
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Debian | Debian Linux | 9.0 | All | All | All |
Operating System | Fedoraproject | Fedora | 33 | All | All | All |
Operating System | Fedoraproject | Fedora | 34 | All | All | All |
Application | Isc | Dhcp | 4.1-esv | r1 | All | All |
Application | Isc | Dhcp | 4.1-esv | r10 | All | All |
Application | Isc | Dhcp | 4.1-esv | r10b1 | All | All |
Application | Isc | Dhcp | 4.1-esv | r10rc1 | All | All |
Application | Isc | Dhcp | 4.1-esv | r10_b1 | All | All |
Application | Isc | Dhcp | 4.1-esv | r10_rc1 | All | All |
Application | Isc | Dhcp | 4.1-esv | r11 | All | All |
Application | Isc | Dhcp | 4.1-esv | r11b1 | All | All |
Application | Isc | Dhcp | 4.1-esv | r11rc1 | All | All |
Application | Isc | Dhcp | 4.1-esv | r11rc2 | All | All |
Application | Isc | Dhcp | 4.1-esv | r11_b1 | All | All |
Application | Isc | Dhcp | 4.1-esv | r11_rc1 | All | All |
Application | Isc | Dhcp | 4.1-esv | r11_rc2 | All | All |
Application | Isc | Dhcp | 4.1-esv | r12 | All | All |
Application | Isc | Dhcp | 4.1-esv | r12-p1 | All | All |
Application | Isc | Dhcp | 4.1-esv | r12b1 | All | All |
Application | Isc | Dhcp | 4.1-esv | r12_b1 | All | All |
Application | Isc | Dhcp | 4.1-esv | r12_p1 | All | All |
Application | Isc | Dhcp | 4.1-esv | r13 | All | All |
Application | Isc | Dhcp | 4.1-esv | r13b1 | All | All |
Application | Isc | Dhcp | 4.1-esv | r13_b1 | All | All |
Application | Isc | Dhcp | 4.1-esv | r14 | All | All |
Application | Isc | Dhcp | 4.1-esv | r14b1 | All | All |
Application | Isc | Dhcp | 4.1-esv | r14_b1 | All | All |
Application | Isc | Dhcp | 4.1-esv | r15 | All | All |
Application | Isc | Dhcp | 4.1-esv | r15-p1 | All | All |
Application | Isc | Dhcp | 4.1-esv | r15_b1 | All | All |
Application | Isc | Dhcp | 4.1-esv | r16 | All | All |
Application | Isc | Dhcp | All | All | All | All |
Application | Netapp | Ontap Select Deploy Administration Utility | - | All | All | All |
Application | Netapp | Solidfire Hci Management Node | - | All | All | All |
Hardware | Siemens | Ruggedcom Rox Mx5000 | - | All | All | All |
Operating System | Siemens | Ruggedcom Rox Mx5000 Firmware | All | All | All | All |
Hardware | Siemens | Ruggedcom Rox Rx1400 | - | All | All | All |
Operating System | Siemens | Ruggedcom Rox Rx1400 Firmware | All | All | All | All |
Hardware | Siemens | Ruggedcom Rox Rx1500 | - | All | All | All |
Operating System | Siemens | Ruggedcom Rox Rx1500 Firmware | All | All | All | All |
Hardware | Siemens | Ruggedcom Rox Rx1501 | - | All | All | All |
Operating System | Siemens | Ruggedcom Rox Rx1501 Firmware | All | All | All | All |
Hardware | Siemens | Ruggedcom Rox Rx1510 | - | All | All | All |
Operating System | Siemens | Ruggedcom Rox Rx1510 Firmware | All | All | All | All |
Hardware | Siemens | Ruggedcom Rox Rx1511 | - | All | All | All |
Operating System | Siemens | Ruggedcom Rox Rx1511 Firmware | All | All | All | All |
Hardware | Siemens | Ruggedcom Rox Rx1512 | - | All | All | All |
Operating System | Siemens | Ruggedcom Rox Rx1512 Firmware | All | All | All | All |
Hardware | Siemens | Ruggedcom Rox Rx1524 | - | All | All | All |
Operating System | Siemens | Ruggedcom Rox Rx1524 Firmware | All | All | All | All |
Hardware | Siemens | Ruggedcom Rox Rx1536 | - | All | All | All |
Operating System | Siemens | Ruggedcom Rox Rx1536 Firmware | All | All | All | All |
Hardware | Siemens | Ruggedcom Rox Rx5000 | - | All | All | All |
Operating System | Siemens | Ruggedcom Rox Rx5000 Firmware | All | All | All | All |
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*:
- cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*:
- cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r10b1:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r10rc1:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r10_b1:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r10_rc1:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r11:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r11b1:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r11rc1:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r11rc2:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r11_b1:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc1:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc2:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r12-p1:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r12b1:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r12_b1:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r12_p1:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r13:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r13b1:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r13_b1:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r14:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r14b1:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r14_b1:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r15:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r15-p1:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r15_b1:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:4.1-esv:r16:*:*:*:*:*:*:
- cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:*:
- cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*:
- cpe:2.3:a:netapp:solidfire_\&_hci_management_node:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_mx5000:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_mx5000_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx1400:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx1400_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx1500:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx1500_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx1501:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx1501_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx1510:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx1510_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx1511:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx1511_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx1512:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx1512_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx1524:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx1524_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx1536:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx1536_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:ruggedcom_rox_rx5000:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:ruggedcom_rox_rx5000_firmware:*:*:*:*:*:*:*:*:
Discovery Credit
ISC would like to thank Jon Franklin from Dell and Pawel Wieczorkiewicz from Amazon Web Services for (independently) reporting this vulnerability.
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
[email protected] modified net/isc-dhcp: update to isc-dhcp-4.4.2-P1 CVE-2021-25217: A buffer overrun in lease file parsing co… twitter.com/i/web/status/1… | 2021-05-26 21:55:20 |
![]() |
OPENBSD_6_9 [email protected] modified net/isc-dhcp: update to isc-dhcp-4.4.2-P1 CVE-2021-25217: A buffer overrun in lease fil… twitter.com/i/web/status/1… | 2021-05-26 21:55:21 |
![]() |
OPENBSD_6_9 [email protected] modified net/isc-dhcp: update to isc-dhcp-4.4.2-P1 CVE-2021-25217: A buffer overrun in lease fil… twitter.com/i/web/status/1… | 2021-05-26 21:55:21 |
![]() |
CVE-2021-25217 : In ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 Other branches of ISC DHCP i.e.,… twitter.com/i/web/status/1… | 2021-05-26 22:18:56 |
![]() |
christos: CVE: CVE-2021-25217 | 2021-05-26 22:49:09 |
![]() |
Nice finding @wipawel (kb.isc.org/docs/cve-2021-…)! A reminder that the F2 team is still hiring @JacobTorrey… twitter.com/i/web/status/1… | 2021-05-27 00:04:42 |
![]() |
CVE-2021-25217 | 2021-05-26 22:41:46 |