Vigil@nce - OpenBSD: denial of service via invalid DHCP options
August 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can send DHCP packets with invalid options to an
OpenBSD host, in order to trigger a denial of service.
Impacted products: OpenBSD
Severity: 2/4
Creation date: 08/08/2014
DESCRIPTION OF THE VULNERABILITY
The OpenBSD product include tools for DHCP.
Request packets and responses packets may contain various options.
However, when the client dhclient and the server dhcpd process
packets with invalid options, the memory used by these options is
not freed.
An attacker can therefore send DHCP packets with invalid options
to an OpenBSD host, in order to trigger a denial of service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/OpenBSD-denial-of-service-via-invalid-DHCP-options-15139