Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-13529

Опубликовано: 26 апр. 2021
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.

An exploitable denial of service vulnerability exists in systemd which does not fully implement RFC3203, as it does not support authentication of FORCERENEW packets. A specially crafted DHCP FORCERENEW packet can cause a system, running the DHCP client, to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHPACK packets to reconfigure the system with arbitrary network settings.

Отчет

This issue did not affect the versions of systemd as shipped with Red Hat Enterprise Linux 8 as they did not include systemd-networkd service. NetworkManager embeds some pieces of systemd code base, including the DHCP client code. For this reason NetworkManager is marked as affected. By default only the versions of NetworkManager as shipped in Red Hat Enterprise Linux 8.0 and 8.1 are affected, as in those versions NetworkManager uses main.dhcp=internal setting (see networkmanager.conf(5)) by default, which relies on systemd DHCP client. On newer Red Hat Enterprise Linux 8 versions NetworkManager uses a different DHCP client by default, which is not affected by this flaw. On Red Hat Enterprise Linux 7 NetworkManager uses main.dhcp=dhclient by default, which is not affected by this flaw either, however users who have explicitly configured main.dhcp=internal would be affected, as the systemd DHCP client would be used in that case.

Меры по смягчению последствий

There is no available mitigation for this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7NetworkManagerOut of support scope
Red Hat Enterprise Linux 7systemdOut of support scope
Red Hat Enterprise Linux 8systemdNot affected
Red Hat Enterprise Linux 9NetworkManagerNot affected
Red Hat Enterprise Linux 9systemdNot affected
Red Hat Enterprise Linux 8NetworkManagerFixedRHSA-2021:436109.11.2021
Red Hat Enterprise Linux 8NetworkManagerFixedRHSA-2021:436109.11.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-306
https://bugzilla.redhat.com/show_bug.cgi?id=1959397systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured

EPSS

Процентиль: 17%
0.00056
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
ubuntu
около 4 лет назад

An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.

CVSS3: 6.1
nvd
около 4 лет назад

An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.

CVSS3: 6.1
debian
около 4 лет назад

An exploitable denial-of-service vulnerability exists in Systemd 245. ...

CVSS3: 6.1
github
около 3 лет назад

An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.

oracle-oval
больше 3 лет назад

ELSA-2021-4361: NetworkManager security, bug fix, and enhancement update (MODERATE)

EPSS

Процентиль: 17%
0.00056
Низкий

6.1 Medium

CVSS3