CVE-2021-25217
Severity
7.4HIGH
EPSS
0.3%
top 46.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 26
Latest updateMay 24
Description
In ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 (Other branches of ISC DHCP (i.e., releases in the 4.0.x series or lower and releases in the 4.3.x series) are beyond their End-of-Life (EOL) and no longer supported by ISC. From inspection it is clear that the defect is also present in releases from those series, but they have not been officially tested for the vulnerability), The outcome of encountering the defect while reading a lease that will trigger it varies, according to: the…
CVSS vector
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:HExploitability: 2.8 | Impact: 4.0
Affected Packages14 packages
Also affects: Debian Linux 9.0, Fedora 33, 34
Patches
🔴Vulnerability Details
3📋Vendor Advisories
5Red Hat▶
dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient↗2021-05-26
Microsoft▶
A buffer overrun in lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient↗2021-05-11
Debian▶
CVE-2021-25217: isc-dhcp - In ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 (Other branches o...↗2021