Vulnerability Name:

CVE-2003-0039 (CCN-11187)

Assigned:2003-01-15
Published:2003-01-15
Updated:2017-10-10
Summary:ISC dhcrelay (dhcp-relay) 3.0rc9 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (packet storm) via a certain BOOTP packet that is forwarded to a broadcast MAC address, causing an infinite loop that is not restricted by a hop count.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: TURBO
Type: UNKNOWN
TLSA-2003-26

Source: MITRE
Type: CNA
CVE-2003-0039

Source: CONECTIVA
Type: UNKNOWN
CLSA-2003:616

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2003:616
dhcp

Source: BUGTRAQ
Type: UNKNOWN
20030115 DoS against DHCP infrastructure with isc dhcrelay

Source: CCN
Type: BugTraq Mailing List, 2003-01-15 14:46:14
DoS against DHCP infrastructure with isc dhcrelay

Source: CCN
Type: RHSA-2003-034
Updated dhcp packages fix possible packet storm

Source: DEBIAN
Type: Patch, Vendor Advisory
DSA-245

Source: DEBIAN
Type: DSA 245-1
dhcp3 -- ignored counter boundary

Source: DEBIAN
Type: DSA-245
dhcp3 -- ignored counter boundary

Source: CCN
Type: US-CERT VU#149953
ISC dhcrelay fails to limit hop count when malicious bootp packet is received

Source: CERT-VN
Type: US Government Resource
VU#149953

Source: CCN
Type: OpenPKG-SA-2003.012
DHCPd

Source: BUGTRAQ
Type: UNKNOWN
20030219 [OpenPKG-SA-2003.012] OpenPKG Security Advisory (dhcpd)

Source: CCN
Type: OSVDB ID: 12645
ISC dhcrelay (dhcp-relay) DHCP Server DoS

Source: REDHAT
Type: UNKNOWN
RHSA-2003:034

Source: BID
Type: UNKNOWN
6628

Source: CCN
Type: BID-6628
ISC DHCPD dhcrelay Extraneous Network Packets Vulnerability

Source: CCN
Type: TLSA-2003-26
DoS vulnerability in dhcp

Source: XF
Type: UNKNOWN
dhcp-dhcrelay-dos(11187)

Source: XF
Type: UNKNOWN
dhcp-dhcrelay-dos(11187)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:isc:dhcpd:3.0.1:rc1:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc10:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc2:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc3:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc4:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc5:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc6:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc7:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc8:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc9:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:isc:dhcpd:3.0.1:rc1:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc10:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc2:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc3:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc4:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc5:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc6:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc7:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc8:*:*:*:*:*:*
  • OR cpe:/a:isc:dhcpd:3.0.1:rc9:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:1.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20030039
    V
    CVE-2003-0039
    2015-11-16
    oval:org.debian:def:245
    V
    ignored counter boundary
    2003-01-28
    BACK
    isc dhcpd 3.0.1 rc1
    isc dhcpd 3.0.1 rc10
    isc dhcpd 3.0.1 rc2
    isc dhcpd 3.0.1 rc3
    isc dhcpd 3.0.1 rc4
    isc dhcpd 3.0.1 rc5
    isc dhcpd 3.0.1 rc6
    isc dhcpd 3.0.1 rc7
    isc dhcpd 3.0.1 rc8
    isc dhcpd 3.0.1 rc9
    isc dhcpd 3.0.1 rc1
    isc dhcpd 3.0.1 rc10
    isc dhcpd 3.0.1 rc2
    isc dhcpd 3.0.1 rc3
    isc dhcpd 3.0.1 rc4
    isc dhcpd 3.0.1 rc5
    isc dhcpd 3.0.1 rc6
    isc dhcpd 3.0.1 rc7
    isc dhcpd 3.0.1 rc8
    isc dhcpd 3.0.1 rc9
    redhat linux 7
    redhat linux 7.1
    redhat linux 7.2
    conectiva linux 8.0
    redhat linux 7.3
    debian debian linux 3.0
    openpkg openpkg current
    redhat linux 8.0
    openpkg openpkg 1.1
    openpkg openpkg 1.2