Vulnerabilities > CVE-2019-6470

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
isc
redhat
opensuse
nessus

Summary

There had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd when operating in DHCPv6 mode. There was also a bug in dhcpd relating to the use of this function per its documentation, but the bug in the library function prevented this from causing any harm. All releases of dhcpd from ISC contain copies of this, and other, BIND libraries in combinations that have been tested prior to release and are known to not present issues like this. Some third-party packagers of ISC software have modified the dhcpd source, BIND source, or version matchup in ways that create the crash potential. Based on reports available to ISC, the crash probability is large and no analysis has been done on how, or even if, the probability can be manipulated by an attacker. Affects: Builds of dhcpd versions prior to version 4.4.1 when using BIND versions 9.11.2 or later, or BIND versions with specific bug fixes backported to them. ISC does not have access to comprehensive version lists for all repackagings of dhcpd that are vulnerable. In particular, builds from other vendors may also be affected. Operators are advised to consult their vendor documentation.

Nessus

  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2019-0190_DHCP.NASL
    descriptionThe remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has dhcp packages installed that are affected by a vulnerability: Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id129934
    published2019-10-15
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/129934
    titleNewStart CGSL CORE 5.04 / MAIN 5.04 : dhcp Vulnerability (NS-SA-2019-0190)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2500.NASL
    descriptionAccording to the version of the dhcp packages installed, the EulerOS installation on the remote host is affected by the following vulnerability : - There had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd when operating in DHCPv6 mode. There was also a bug in dhcpd relating to the use of this function per its documentation, but the bug in the library function prevented this from causing any harm. All releases of dhcpd from ISC contain copies of this, and other, BIND libraries in combinations that have been tested prior to release and are known to not present issues like this. Some third-party packagers of ISC software have modified the dhcpd source, BIND source, or version matchup in ways that create the crash potential. Based on reports available to ISC, the crash probability is large and no analysis has been done on how, or even if, the probability can be manipulated by an attacker. Affects: Builds of dhcpd versions prior to version 4.4.1 when using BIND versions 9.11.2 or later, or BIND versions with specific bug fixes backported to them. ISC does not have access to comprehensive version lists for all repackagings of dhcpd that are vulnerable. In particular, builds from other vendors may also be affected. Operators are advised to consult their vendor documentation.(CVE-2019-6470) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-08
    modified2019-12-04
    plugin id131653
    published2019-12-04
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/131653
    titleEulerOS 2.0 SP2 : dhcp (EulerOS-SA-2019-2500)
  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2019-0231_DHCP.NASL
    descriptionThe remote NewStart CGSL host, running version CORE 5.05 / MAIN 5.05, has dhcp packages installed that are affected by a vulnerability: - There had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd when operating in DHCPv6 mode. There was also a bug in dhcpd relating to the use of this function per its documentation, but the bug in the library function prevented this from causing any harm. All releases of dhcpd from ISC contain copies of this, and other, BIND libraries in combinations that have been tested prior to release and are known to not present issues like this. Some third-party packagers of ISC software have modified the dhcpd source, BIND source, or version matchup in ways that create the crash potential. Based on reports available to ISC, the crash probability is large and no analysis has been done on how, or even if, the probability can be manipulated by an attacker. Affects: Builds of dhcpd versions prior to version 4.4.1 when using BIND versions 9.11.2 or later, or BIND versions with specific bug fixes backported to them. ISC does not have access to comprehensive version lists for all repackagings of dhcpd that are vulnerable. In particular, builds from other vendors may also be affected. Operators are advised to consult their vendor documentation. (CVE-2019-6470) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id132472
    published2019-12-31
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/132472
    titleNewStart CGSL CORE 5.05 / MAIN 5.05 : dhcp Vulnerability (NS-SA-2019-0231)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2020-1204.NASL
    descriptionAccording to the version of the dhcp packages installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerability : - There had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd when operating in DHCPv6 mode. There was also a bug in dhcpd relating to the use of this function per its documentation, but the bug in the library function prevented this from causing any harm. All releases of dhcpd from ISC contain copies of this, and other, BIND libraries in combinations that have been tested prior to release and are known to not present issues like this. Some third-party packagers of ISC software have modified the dhcpd source, BIND source, or version matchup in ways that create the crash potential. Based on reports available to ISC, the crash probability is large and no analysis has been done on how, or even if, the probability can be manipulated by an attacker. Affects: Builds of dhcpd versions prior to version 4.4.1 when using BIND versions 9.11.2 or later, or BIND versions with specific bug fixes backported to them. ISC does not have access to comprehensive version lists for all repackagings of dhcpd that are vulnerable. In particular, builds from other vendors may also be affected. Operators are advised to consult their vendor documentation.(CVE-2019-6470) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-19
    modified2020-03-13
    plugin id134493
    published2020-03-13
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/134493
    titleEulerOS Virtualization for ARM 64 3.0.2.0 : dhcp (EulerOS-SA-2020-1204)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2137.NASL
    descriptionAccording to the version of the dhcp packages installed, the EulerOS installation on the remote host is affected by the following vulnerability : - The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.Security Fix(es):There had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd when operating in DHCPv6 mode. There was also a bug in dhcpd relating to the use of this function per its documentation, but the bug in the library function prevented this from causing any harm. All releases of dhcpd from ISC contain copies of this, and other, BIND libraries in combinations that have been tested prior to release and are known to not present issues like this. Some third-party packagers of ISC software have modified the dhcpd source, BIND source, or version matchup in ways that create the crash potential. Based on reports available to ISC, the crash probability is large and no analysis has been done on how, or even if, the probability can be manipulated by an attacker. Affects: Builds of dhcpd versions prior to version 4.4.1 when using BIND versions 9.11.2 or later, or BIND versions with specific bug fixes backported to them. ISC does not have access to comprehensive version lists for all repackagings of dhcpd that are vulnerable. In particular, builds from other vendors may also be affected. Operators are advised to consult their vendor documentation.(CVE-2019-6470) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-08
    modified2019-11-12
    plugin id130846
    published2019-11-12
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130846
    titleEulerOS 2.0 SP5 : dhcp (EulerOS-SA-2019-2137)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2020-1267.NASL
    descriptionAccording to the version of the dhcp-noddns packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerability : - There had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd when operating in DHCPv6 mode. There was also a bug in dhcpd relating to the use of this function per its documentation, but the bug in the library function prevented this from causing any harm. All releases of dhcpd from ISC contain copies of this, and other, BIND libraries in combinations that have been tested prior to release and are known to not present issues like this. Some third-party packagers of ISC software have modified the dhcpd source, BIND source, or version matchup in ways that create the crash potential. Based on reports available to ISC, the crash probability is large and no analysis has been done on how, or even if, the probability can be manipulated by an attacker. Affects: Builds of dhcpd versions prior to version 4.4.1 when using BIND versions 9.11.2 or later, or BIND versions with specific bug fixes backported to them. ISC does not have access to comprehensive version lists for all repackagings of dhcpd that are vulnerable. In particular, builds from other vendors may also be affected. Operators are advised to consult their vendor documentation.(CVE-2019-6470) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-26
    modified2020-03-20
    plugin id134733
    published2020-03-20
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/134733
    titleEulerOS Virtualization 3.0.2.2 : dhcp-noddns (EulerOS-SA-2020-1267)
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2020-3_0-0063_BINDUTILS.NASL
    descriptionAn update of the bindutils package has been released.
    last seen2020-03-17
    modified2020-03-02
    plugin id134209
    published2020-03-02
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/134209
    titlePhoton OS 3.0: Bindutils PHSA-2020-3.0-0063
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-3973-1.NASL
    descriptionIt was discovered that DHCP, when built with a mismatched external BIND library, incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause DHCP to crash, resulting in a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id125026
    published2019-05-14
    reporterUbuntu Security Notice (C) 2019-2020 Canonical, Inc. / NASL script (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125026
    titleUbuntu 18.04 LTS / 18.10 : isc-dhcp vulnerability (USN-3973-1)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-3525.NASL
    descriptionAn update for dhcp is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Security Fix(es) : * dhcp: double-deletion of the released addresses in the dhcpv6 code leading to crash and possible DoS (CVE-2019-6470) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id130549
    published2019-11-06
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130549
    titleRHEL 8 : dhcp (RHSA-2019:3525)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-2341.NASL
    descriptionThis update for dhcp fixes the following issues : Secuirty issue fixed : - CVE-2019-6470: Fixed DHCPv6 server crashes (bsc#1134078). Bug fixes : - Add compile option --enable-secs-byteorder to avoid duplicate lease warnings (bsc#1089524). - Use IPv6 when called as dhclient6, dhcpd6, and dhcrelay6 (bsc#1136572). This update was imported from the SUSE:SLE-15:Update update project.
    last seen2020-06-01
    modified2020-06-02
    plugin id130081
    published2019-10-21
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130081
    titleopenSUSE Security Update : dhcp (openSUSE-2019-2341)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2336.NASL
    descriptionAccording to the version of the dhcp packages installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerability : - There had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd when operating in DHCPv6 mode. There was also a bug in dhcpd relating to the use of this function per its documentation, but the bug in the library function prevented this from causing any harm. All releases of dhcpd from ISC contain copies of this, and other, BIND libraries in combinations that have been tested prior to release and are known to not present issues like this. Some third-party packagers of ISC software have modified the dhcpd source, BIND source, or version matchup in ways that create the crash potential. Based on reports available to ISC, the crash probability is large and no analysis has been done on how, or even if, the probability can be manipulated by an attacker. Affects: Builds of dhcpd versions prior to version 4.4.1 when using BIND versions 9.11.2 or later, or BIND versions with specific bug fixes backported to them. ISC does not have access to comprehensive version lists for all repackagings of dhcpd that are vulnerable. In particular, builds from other vendors may also be affected. Operators are advised to consult their vendor documentation.(CVE-2019-6470) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id131501
    published2019-12-03
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/131501
    titleEulerOS Virtualization for ARM 64 3.0.3.0 : dhcp (EulerOS-SA-2019-2336)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-2340.NASL
    descriptionThis update for dhcp fixes the following issues : Secuirty issue fixed : - CVE-2019-6470: Fixed DHCPv6 server crashes (bsc#1134078). Bug fixes : - Add compile option --enable-secs-byteorder to avoid duplicate lease warnings (bsc#1089524). - Use IPv6 when called as dhclient6, dhcpd6, and dhcrelay6 (bsc#1136572). This update was imported from the SUSE:SLE-15:Update update project.
    last seen2020-06-01
    modified2020-06-02
    plugin id130080
    published2019-10-21
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130080
    titleopenSUSE Security Update : dhcp (openSUSE-2019-2340)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-2060.NASL
    descriptionAn update for dhcp is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Security Fix(es) : * dhcp: double-deletion of the released addresses in the dhcpv6 code leading to crash and possible DoS (CVE-2019-6470) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id127664
    published2019-08-12
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127664
    titleRHEL 7 : dhcp (RHSA-2019:2060)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2019-2060.NASL
    descriptionAn update for dhcp is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Security Fix(es) : * dhcp: double-deletion of the released addresses in the dhcpv6 code leading to crash and possible DoS (CVE-2019-6470) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id128345
    published2019-08-30
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128345
    titleCentOS 7 : dhcp (CESA-2019:2060)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20190806_DHCP_ON_SL7_X.NASL
    descriptionSecurity Fix(es) : - dhcp: double-deletion of the released addresses in the dhcpv6 code leading to crash and possible DoS (CVE-2019-6470)
    last seen2020-03-18
    modified2019-08-27
    plugin id128213
    published2019-08-27
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128213
    titleScientific Linux Security Update : dhcp on SL7.x x86_64 (20190806)
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2020-1_0-0287_BINDUTILS.NASL
    descriptionAn update of the bindutils package has been released.
    last seen2020-04-22
    modified2020-04-15
    plugin id135483
    published2020-04-15
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135483
    titlePhoton OS 1.0: Bindutils PHSA-2020-1.0-0287
  • NASL familyAmazon Linux Local Security Checks
    NASL idAL2_ALAS-2019-1346.NASL
    descriptionThere had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd when operating in DHCPv6 mode. There was also a bug in dhcpd relating to the use of this function per its documentation, but the bug in the library function prevented this from causing any harm. All releases of dhcpd from ISC contain copies of this, and other, BIND libraries in combinations that have been tested prior to release and are known to not present issues like this. Some third-party packagers of ISC software have modified the dhcpd source, BIND source, or version matchup in ways that create the crash potential. Based on reports available to ISC, the crash probability is large and no analysis has been done on how, or even if, the probability can be manipulated by an attacker. Affects: Builds of dhcpd versions prior to version 4.4.1 when using BIND versions 9.11.2 or later, or BIND versions with specific bug fixes backported to them. ISC does not have access to comprehensive version lists for all repackagings of dhcpd that are vulnerable. In particular, builds from other vendors may also be affected. Operators are advised to consult their vendor documentation.(CVE-2019-6470)
    last seen2020-06-01
    modified2020-06-02
    plugin id130599
    published2019-11-07
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130599
    titleAmazon Linux 2 : dhcp (ALAS-2019-1346)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-2727-1.NASL
    descriptionThis update for dhcp fixes the following issues : Secuirty issue fixed : CVE-2019-6470: Fixed DHCPv6 server crashes (bsc#1134078). Bug fixes: Add compile option --enable-secs-byteorder to avoid duplicate lease warnings (bsc#1089524). Use IPv6 when called as dhclient6, dhcpd6, and dhcrelay6 (bsc#1136572). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id130144
    published2019-10-22
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130144
    titleSUSE SLED12 / SLES12 Security Update : dhcp (SUSE-SU-2019:2727-1)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2020-1273.NASL
    descriptionAccording to the version of the dhcp packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerability : - There had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd when operating in DHCPv6 mode. There was also a bug in dhcpd relating to the use of this function per its documentation, but the bug in the library function prevented this from causing any harm. All releases of dhcpd from ISC contain copies of this, and other, BIND libraries in combinations that have been tested prior to release and are known to not present issues like this. Some third-party packagers of ISC software have modified the dhcpd source, BIND source, or version matchup in ways that create the crash potential. Based on reports available to ISC, the crash probability is large and no analysis has been done on how, or even if, the probability can be manipulated by an attacker. Affects: Builds of dhcpd versions prior to version 4.4.1 when using BIND versions 9.11.2 or later, or BIND versions with specific bug fixes backported to them. ISC does not have access to comprehensive version lists for all repackagings of dhcpd that are vulnerable. In particular, builds from other vendors may also be affected. Operators are advised to consult their vendor documentation.(CVE-2019-6470) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-26
    modified2020-03-20
    plugin id134739
    published2020-03-20
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/134739
    titleEulerOS Virtualization 3.0.2.2 : dhcp (EulerOS-SA-2020-1273)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2568.NASL
    descriptionAccording to the version of the dhcp packages installed, the EulerOS installation on the remote host is affected by the following vulnerability : - There had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd when operating in DHCPv6 mode. There was also a bug in dhcpd relating to the use of this function per its documentation, but the bug in the library function prevented this from causing any harm. All releases of dhcpd from ISC contain copies of this, and other, BIND libraries in combinations that have been tested prior to release and are known to not present issues like this. Some third-party packagers of ISC software have modified the dhcpd source, BIND source, or version matchup in ways that create the crash potential. Based on reports available to ISC, the crash probability is large and no analysis has been done on how, or even if, the probability can be manipulated by an attacker. Affects: Builds of dhcpd versions prior to version 4.4.1 when using BIND versions 9.11.2 or later, or BIND versions with specific bug fixes backported to them. ISC does not have access to comprehensive version lists for all repackagings of dhcpd that are vulnerable. In particular, builds from other vendors may also be affected. Operators are advised to consult their vendor documentation.(CVE-2019-6470) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-08
    modified2019-12-19
    plugin id132285
    published2019-12-19
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/132285
    titleEulerOS 2.0 SP3 : dhcp (EulerOS-SA-2019-2568)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1826.NASL
    descriptionAccording to the version of the dhcp packages installed, the EulerOS installation on the remote host is affected by the following vulnerability : - dhcp: double-deletion of the released addresses in the dhcpv6 code leading to crash and possible DoS (CVE-2019-6470) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-03
    modified2019-08-27
    plugin id128195
    published2019-08-27
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128195
    titleEulerOS 2.0 SP8 : dhcp (EulerOS-SA-2019-1826)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-2657-1.NASL
    descriptionThis update for dhcp fixes the following issues : Secuirty issue fixed : CVE-2019-6470: Fixed DHCPv6 server crashes (bsc#1134078). Bug fixes: Add compile option --enable-secs-byteorder to avoid duplicate lease warnings (bsc#1089524). Use IPv6 when called as dhclient6, dhcpd6, and dhcrelay6 (bsc#1136572). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id129881
    published2019-10-15
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/129881
    titleSUSE SLED15 / SLES15 Security Update : dhcp (SUSE-SU-2019:2657-1)
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2020-2_0-0223_BINDUTILS.NASL
    descriptionAn update of the bindutils package has been released.
    last seen2020-04-14
    modified2020-04-10
    plugin id135306
    published2020-04-10
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135306
    titlePhoton OS 2.0: Bindutils PHSA-2020-2.0-0223
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-2727-2.NASL
    descriptionThis update for dhcp fixes the following issues : Secuirty issue fixed : CVE-2019-6470: Fixed DHCPv6 server crashes (bsc#1134078). Bug fixes: Add compile option --enable-secs-byteorder to avoid duplicate lease warnings (bsc#1089524). Use IPv6 when called as dhclient6, dhcpd6, and dhcrelay6 (bsc#1136572). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id130941
    published2019-11-13
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130941
    titleSUSE SLES12 Security Update : dhcp (SUSE-SU-2019:2727-2)

Redhat

advisories
  • bugzilla
    id1708641
    titleCVE-2019-6470 dhcp: double-deletion of the released addresses in the dhcpv6 code leading to crash and possible DoS
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 7 is installed
        ovaloval:com.redhat.rhba:tst:20150364027
      • OR
        • AND
          • commentdhcp-libs is earlier than 12:4.2.5-77.el7
            ovaloval:com.redhat.rhsa:tst:20192060001
          • commentdhcp-libs is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20162590002
        • AND
          • commentdhclient is earlier than 12:4.2.5-77.el7
            ovaloval:com.redhat.rhsa:tst:20192060003
          • commentdhclient is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100923006
        • AND
          • commentdhcp-common is earlier than 12:4.2.5-77.el7
            ovaloval:com.redhat.rhsa:tst:20192060005
          • commentdhcp-common is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20111819004
        • AND
          • commentdhcp is earlier than 12:4.2.5-77.el7
            ovaloval:com.redhat.rhsa:tst:20192060007
          • commentdhcp is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100923004
        • AND
          • commentdhcp-devel is earlier than 12:4.2.5-77.el7
            ovaloval:com.redhat.rhsa:tst:20192060009
          • commentdhcp-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100923002
    rhsa
    idRHSA-2019:2060
    released2019-08-06
    severityModerate
    titleRHSA-2019:2060: dhcp security and bug fix update (Moderate)
  • bugzilla
    id1708641
    titleCVE-2019-6470 dhcp: double-deletion of the released addresses in the dhcpv6 code leading to crash and possible DoS
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 8 is installed
        ovaloval:com.redhat.rhba:tst:20193384074
      • OR
        • AND
          • commentdhcp-common is earlier than 12:4.3.6-34.el8
            ovaloval:com.redhat.rhsa:tst:20193525001
          • commentdhcp-common is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20111819004
        • AND
          • commentdhcp-client is earlier than 12:4.3.6-34.el8
            ovaloval:com.redhat.rhsa:tst:20193525003
          • commentdhcp-client is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20193525004
        • AND
          • commentdhcp-libs is earlier than 12:4.3.6-34.el8
            ovaloval:com.redhat.rhsa:tst:20193525005
          • commentdhcp-libs is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20162590002
        • AND
          • commentdhcp-debugsource is earlier than 12:4.3.6-34.el8
            ovaloval:com.redhat.rhsa:tst:20193525007
          • commentdhcp-debugsource is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20193525008
        • AND
          • commentdhcp-relay is earlier than 12:4.3.6-34.el8
            ovaloval:com.redhat.rhsa:tst:20193525009
          • commentdhcp-relay is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20193525010
        • AND
          • commentdhcp-server is earlier than 12:4.3.6-34.el8
            ovaloval:com.redhat.rhsa:tst:20193525011
          • commentdhcp-server is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20193525012
    rhsa
    idRHSA-2019:3525
    released2019-11-05
    severityModerate
    titleRHSA-2019:3525: dhcp security and bug fix update (Moderate)
rpms
  • dhclient-12:4.2.5-77.el7
  • dhcp-12:4.2.5-77.el7
  • dhcp-common-12:4.2.5-77.el7
  • dhcp-debuginfo-12:4.2.5-77.el7
  • dhcp-devel-12:4.2.5-77.el7
  • dhcp-libs-12:4.2.5-77.el7
  • dhcp-client-12:4.3.6-34.el8
  • dhcp-client-debuginfo-12:4.3.6-34.el8
  • dhcp-common-12:4.3.6-34.el8
  • dhcp-debuginfo-12:4.3.6-34.el8
  • dhcp-debugsource-12:4.3.6-34.el8
  • dhcp-libs-12:4.3.6-34.el8
  • dhcp-libs-debuginfo-12:4.3.6-34.el8
  • dhcp-relay-12:4.3.6-34.el8
  • dhcp-relay-debuginfo-12:4.3.6-34.el8
  • dhcp-server-12:4.3.6-34.el8
  • dhcp-server-debuginfo-12:4.3.6-34.el8