An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.

Project Subscriptions

Vendors Products
Fedoraproject Subscribe
Active Iq Unified Manager Subscribe
Cloud Backup Subscribe
Enterprise Linux Subscribe
Systemd Project Subscribe
Systemd Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-5776 An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.
Ubuntu USN Ubuntu USN USN-5013-1 systemd vulnerabilities
Ubuntu USN Ubuntu USN USN-5013-2 systemd vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-08-04T12:18:18.443Z

Reserved: 2020-05-26T00:00:00

Link: CVE-2020-13529

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-05-10T16:15:07.373

Modified: 2024-11-21T05:01:26.123

Link: CVE-2020-13529

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-04-26T00:00:00Z

Links: CVE-2020-13529 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses