ISC DHCP server 4.2 before 4.2.0-P2, when configured to use failover partnerships, allows remote attackers to cause a denial of service (communications-interrupted state and DHCP client service loss) by connecting to a port that is only intended for a failover peer, as demonstrated by a Nagios check_tcp process check to TCP port 520.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052329.html | vendor-advisory x_refsource_FEDORA |
| http://secunia.com/advisories/42618 | third-party-advisory x_refsource_SECUNIA |
| http://www.vupen.com/english/advisories/2010/3208 | vdb-entry x_refsource_VUPEN |
| http://www.vupen.com/english/advisories/2011/0052 | vdb-entry x_refsource_VUPEN |
| https://lists.isc.org/pipermail/dhcp-users/2010-December/012368.html | mailing-list x_refsource_MLIST |
| https://www.isc.org/software/dhcp/advisories/cve-2010-3616 | x_refsource_CONFIRM |
| http://www.kb.cert.org/vuls/id/159528 | third-party-advisory x_refsource_CERT-VN |
| http://www.securitytracker.com/id?1024862 | vdb-entry x_refsource_SECTRACK |
| http://www.mandriva.com/security/advisories?name=MDVSA-2011:001 | vendor-advisory x_refsource_MANDRIVA |
| http://www.securityfocus.com/bid/45360 | vdb-entry x_refsource_BID |
| http://secunia.com/advisories/42682 | third-party-advisory x_refsource_SECUNIA |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|