Описание
ISC dhcrelay (dhcp-relay) 3.0rc9 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (packet storm) via a certain BOOTP packet that is forwarded to a broadcast MAC address, causing an infinite loop that is not restricted by a hop count.
ISC dhcrelay (dhcp-relay) 3.0rc9 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (packet storm) via a certain BOOTP packet that is forwarded to a broadcast MAC address, causing an infinite loop that is not restricted by a hop count.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2003-0039
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11187
- http://cc.turbolinux.com/security/TLSA-2003-26.txt
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000616
- http://marc.info/?l=bugtraq&m=104310927813830&w=2
- http://www.debian.org/security/2003/dsa-245
- http://www.kb.cert.org/vuls/id/149953
- http://www.openpkg.org/security/OpenPKG-SA-2003.012-dhcpd.html
- http://www.redhat.com/support/errata/RHSA-2003-034.html
- http://www.securityfocus.com/bid/6628
EPSS
CVE ID
Связанные уязвимости
ISC dhcrelay (dhcp-relay) 3.0rc9 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (packet storm) via a certain BOOTP packet that is forwarded to a broadcast MAC address, causing an infinite loop that is not restricted by a hop count.
ISC dhcrelay (dhcp-relay) 3.0rc9 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (packet storm) via a certain BOOTP packet that is forwarded to a broadcast MAC address, causing an infinite loop that is not restricted by a hop count.
ISC dhcrelay (dhcp-relay) 3.0rc9 and earlier, and possibly other versi ...
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS