Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
isc dhcp 4.2.0 vulnerabilities and exploits
(subscribe to this query)
446
VMScore
CVE-2018-5732
Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affe...
Isc Dhcp 4.1-esv
Isc Dhcp
Isc Dhcp 4.1.2
Isc Dhcp 4.4.0
632
VMScore
CVE-2016-2774
ISC DHCP 4.1.x prior to 4.1-ESV-R13 and 4.2.x and 4.3.x prior to 4.3.4 does not restrict the number of concurrent TCP sessions, which allows remote malicious users to cause a denial of service (INSIST assertion failure or request-processing outage) by establishing many sessions.
Isc Dhcp 4.1-esv
Isc Dhcp 4.1.0
Isc Dhcp 4.1.1
Isc Dhcp 4.1.2
Isc Dhcp 4.2.0
Isc Dhcp 4.2.1
Isc Dhcp 4.2.2
Isc Dhcp 4.2.3
Isc Dhcp 4.2.4
Isc Dhcp 4.2.5
Isc Dhcp 4.2.6
Isc Dhcp 4.2.7
Isc Dhcp 4.2.8
Isc Dhcp 4.3.0
Isc Dhcp 4.3.1
Isc Dhcp 4.3.2
Isc Dhcp 4.3.3
Debian Debian Linux 8.0
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 17.10
507
VMScore
CVE-2015-8605
ISC DHCP 4.x prior to 4.1-ESV-R12-P1, 4.2.x, and 4.3.x prior to 4.3.3-P1 allows remote malicious users to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet.
Sophos Unified Threat Management Up2date
Isc Dhcp 4.0.0
Isc Dhcp 4.0.1
Isc Dhcp 4.0.2
Isc Dhcp 4.0.3
Isc Dhcp 4.1-esv
Isc Dhcp 4.1.0
Isc Dhcp 4.1.1
Isc Dhcp 4.1.2
Isc Dhcp 4.2.0
Isc Dhcp 4.2.1
Isc Dhcp 4.2.2
Isc Dhcp 4.2.3
Isc Dhcp 4.2.4
Isc Dhcp 4.2.5
Isc Dhcp 4.2.6
Isc Dhcp 4.2.7
Isc Dhcp 4.2.8
Isc Dhcp 4.3.0
Isc Dhcp 4.3.1
Isc Dhcp 4.3.2
Isc Dhcp 4.3.3
436
VMScore
CVE-2013-2494
libdns in ISC DHCP 4.2.x prior to 4.2.5-P1 allows remote name servers to cause a denial of service (memory consumption) via vectors involving a regular expression, as demonstrated by a memory-exhaustion attack against a machine running a dhcpd process, a related issue to CVE-2013...
Isc Dhcp 4.2.2
Isc Dhcp 4.2.0
Isc Dhcp 4.2.4
Isc Dhcp 4.2.1
Isc Dhcp 4.2.3
Isc Dhcp 4.2.5
507
VMScore
CVE-2012-3570
Buffer overflow in ISC DHCP 4.2.x prior to 4.2.4-P1, when DHCPv6 mode is enabled, allows remote malicious users to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.
Isc Dhcp 4.2.0
Isc Dhcp 4.2.1
Isc Dhcp 4.2.2
Isc Dhcp 4.2.3
Isc Dhcp 4.2.4
615
VMScore
CVE-2012-3571
ISC DHCP 4.1.2 up to and including 4.2.4 and 4.1-ESV prior to 4.1-ESV-R6 allows remote malicious users to cause a denial of service (infinite loop and CPU consumption) via a malformed client identifier.
Isc Dhcp 4.1.2
Isc Dhcp 4.2.0
Isc Dhcp 4.2.1
Isc Dhcp 4.2.2
Isc Dhcp 4.2.3
Isc Dhcp 4.2.4
Isc Dhcp 4.1-esv
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 12.04
Debian Debian Linux 6.0
Debian Debian Linux 7.0
1 EDB exploit
294
VMScore
CVE-2012-3954
Multiple memory leaks in ISC DHCP 4.1.x and 4.2.x prior to 4.2.4-P1 and 4.1-ESV prior to 4.1-ESV-R6 allow remote malicious users to cause a denial of service (memory consumption) by sending many requests.
Isc Dhcp 4.1.0
Isc Dhcp 4.1.1
Isc Dhcp 4.1.2
Isc Dhcp 4.2.0
Isc Dhcp 4.2.1
Isc Dhcp 4.2.2
Isc Dhcp 4.2.3
Isc Dhcp 4.2.4
Isc Dhcp 4.1-esv
Debian Debian Linux 6.0
Debian Debian Linux 7.0
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 12.04
543
VMScore
CVE-2011-4868
The logging functionality in dhcpd in ISC DHCP prior to 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon c...
Isc Dhcp 4.2.1
Isc Dhcp 4.1.0
Isc Dhcp 4.0.0
Isc Dhcp 3.0
Isc Dhcp 3.0.6
Isc Dhcp 3.0.4
Isc Dhcp 3.0.3
Isc Dhcp 3.0.2
Isc Dhcp 3.0.1
Isc Dhcp
Isc Dhcp 4.2.3
Isc Dhcp 4.2.0
Isc Dhcp 3.1.0
Isc Dhcp 3.0.5
Isc Dhcp 4.2.2
445
VMScore
CVE-2011-4539
dhcpd in ISC DHCP 4.x prior to 4.2.3-P1 and 4.1-ESV prior to 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote malicious users to cause a denial of service (daemon crash) via a crafted request packet.
Isc Dhcp 4.0
Isc Dhcp 4.0.0
Isc Dhcp 4.0.1
Isc Dhcp 4.0.2
Isc Dhcp 4.0.3
Isc Dhcp 4.1.1
Isc Dhcp 4.1.2
Isc Dhcp 4.2.0
Isc Dhcp 4.2.1
Isc Dhcp 4.2.2
Isc Dhcp 4.2.3
Isc Dhcp 4.1-esv
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Debian Debian Linux 6.0
Debian Debian Linux 7.0
694
VMScore
CVE-2011-2748
The server in ISC DHCP 3.x and 4.x prior to 4.2.2, 3.1-ESV prior to 3.1-ESV-R3, and 4.1-ESV prior to 4.1-ESV-R3 allows remote malicious users to cause a denial of service (daemon exit) via a crafted DHCP packet.
Isc Dhcp 3.0
Isc Dhcp 3.0.1
Isc Dhcp 3.0.2
Isc Dhcp 3.0.3
Isc Dhcp 3.0.4
Isc Dhcp 3.0.5
Isc Dhcp 3.0.6
Isc Dhcp 3.1
Isc Dhcp 3.1-esv
Isc Dhcp 3.1.0
Isc Dhcp 3.1.1
Isc Dhcp 3.1.2
Isc Dhcp 3.1.3
Isc Dhcp 4.0
Isc Dhcp 4.0-esv
Isc Dhcp 4.0.0
Isc Dhcp 4.0.1
Isc Dhcp 4.0.2
Isc Dhcp 4.0.3
Isc Dhcp 4.1-esv
Isc Dhcp 4.1.0
Isc Dhcp 4.1.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »