Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Update for dhcp RHSA-2011:0256-01
Summary:The remote host is missing an update for the 'dhcp'; package(s) announced via the referenced advisory.
The remote host is missing an update for the 'dhcp'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows
individual devices on an IP network to get their own network configuration
information, including an IP address, a subnet mask, and a broadcast
address. DHCPv6 is the DHCP protocol version for IPv6 networks.

A flaw was found in the way the dhcpd daemon processed certain DHCPv6
messages for addresses that had previously been declined and marked as
abandoned internally. If a remote attacker sent such messages to dhcpd, it
could cause dhcpd to crash due to an assertion failure if it was running as
a DHCPv6 server. (CVE-2011-0413)

Red Hat would like to thank Internet Systems Consortium for reporting this

Users running dhcpd as a DHCPv6 server should upgrade to these updated
packages, which contain a backported patch to correct this issue. After
installing this update, all DHCP servers will be restarted automatically.

Affected Software/OS:
dhcp on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)

Please Install the Updated Packages.

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-0413
BugTraq ID: 46035
CERT/CC vulnerability note: VU#686084
Debian Security Information: DSA-2184 (Google Search)
XForce ISS Database: dhcp-dhcpv6-dos(64959)
CopyrightCopyright (c) 2012 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.