[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2022-1874 --- dhcp

ID: oval:org.secpod.oval:def:1701057Date: (C)2022-11-10   (M)2023-11-13
Class: PATCHFamily: unix




An integer overflow vulnerability was found in the DHCP server. When the "option_code_hash_lookup" function is called from "add_option", it increases the option's "refcount" field. However, there is not a corresponding call to "option_dereference" to decrement the "refcount" field. The "add_option" function is only used in server responses to lease query packets. Each lease query response calls this function for several options. Hence, a DHCP server configured with "allow lease query" a remote machine with access to the server, can send lease queries for the same lease multiple times, leading to the "add_option" function being called repeatedly. This issue could cause the reference counters to overflow and the server to abort or crash. A vulnerability was found in the DHCP server where the "fqdn_universe_decode" function allocates buffer space for the contents of option 81 data received in a DHCP packet. The maximum length of a DNS "label" is 63 bytes. The function tests the length byte of each label contained in the "fqdn"; if it finds a label whose length byte value is larger than 63, it returns without dereferencing the buffer space. This issue causes a memory leak. On a system with access to a DHCP server, an attacker from any adjacent network could send DHCP packets crafted to include "fqdn" labels longer than 63 bytes to the DHCP server, eventually causing the server to run out of memory and crash

Platform:
Amazon Linux 2
Product:
dhcp
dhclient
Reference:
ALAS2-2022-1874
CVE-2022-2928
CVE-2022-2929
CVE    2
CVE-2022-2929
CVE-2022-2928

© SecPod Technologies