Description
A vulnerability stemming from failure to properly clean up closed OMAPI connections can lead to exhaustion of the pool of socket descriptors available to the DHCP server. Affects ISC DHCP 4.1.0 to 4.1-ESV-R15, 4.2.0 to 4.2.8, 4.3.0 to 4.3.6. Older versions may also be affected but are well beyond their end-of-life (EOL). Releases prior to 4.1.0 have not been tested.
Published: 2019-01-16
Score: 7.5 High
EPSS: 17.6% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

The recommended remedy is to disallow access to the OMAPI control port from unauthorized clients (in accordance with best practices for server operation).

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-4133-1 isc-dhcp security update
Ubuntu USN Ubuntu USN USN-3586-1 DHCP vulnerabilities
History

No history.

Subscriptions

Canonical Ubuntu Linux
Debian Debian Linux
Isc Dhcp
Redhat Enterprise Linux Enterprise Linux Desktop Enterprise Linux Server Enterprise Linux Server Aus Enterprise Linux Server Eus Enterprise Linux Server Tus Enterprise Linux Workstation
cve-icon MITRE

Status: PUBLISHED

Assigner: isc

Published:

Updated: 2024-09-16T22:46:13.879Z

Reserved: 2016-12-02T00:00:00.000Z

Link: CVE-2017-3144

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-01-16T20:29:00.627

Modified: 2024-11-21T03:24:55.567

Link: CVE-2017-3144

cve-icon Redhat

Severity : Moderate

Publid Date: 2017-12-07T00:00:00Z

Links: CVE-2017-3144 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses