6.5

CVE-2022-2929

In ISC DHCP 1.0 -> 4.4.3, ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16-P1 a system with access to a DHCP server, sending DHCP packets crafted to include fqdn labels longer than 63 bytes, could eventually cause the server to run out of memory.

Data is provided by the National Vulnerability Database (NVD)
IscDhcp Version >= 1.0.0 < 4.1-esv
IscDhcp Version >= 4.2.0 <= 4.4.3
IscDhcp Version4.1-esv Updater1
IscDhcp Version4.1-esv Updater10
IscDhcp Version4.1-esv Updater10_b1
IscDhcp Version4.1-esv Updater10_rc1
IscDhcp Version4.1-esv Updater10b1
IscDhcp Version4.1-esv Updater10rc1
IscDhcp Version4.1-esv Updater11
IscDhcp Version4.1-esv Updater11_b1
IscDhcp Version4.1-esv Updater11_rc1
IscDhcp Version4.1-esv Updater11_rc2
IscDhcp Version4.1-esv Updater11b1
IscDhcp Version4.1-esv Updater11rc1
IscDhcp Version4.1-esv Updater11rc2
IscDhcp Version4.1-esv Updater12
IscDhcp Version4.1-esv Updater12-p1
IscDhcp Version4.1-esv Updater12_b1
IscDhcp Version4.1-esv Updater12_p1
IscDhcp Version4.1-esv Updater12b1
IscDhcp Version4.1-esv Updater13
IscDhcp Version4.1-esv Updater13_b1
IscDhcp Version4.1-esv Updater13b1
IscDhcp Version4.1-esv Updater14
IscDhcp Version4.1-esv Updater14_b1
IscDhcp Version4.1-esv Updater14b1
IscDhcp Version4.1-esv Updater15
IscDhcp Version4.1-esv Updater15-p1
IscDhcp Version4.1-esv Updater15_b1
IscDhcp Version4.1-esv Updater16
IscDhcp Version4.1-esv Updater16-p1
DebianDebian Linux Version10.0
FedoraprojectFedora Version35
FedoraprojectFedora Version36
FedoraprojectFedora Version37
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.106
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
security-officer@isc.org 6.5 2.8 3.6
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-770 Allocation of Resources Without Limits or Throttling

The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.