SHARE
Facebook X Pinterest WhatsApp

Buffer Overflows Found in DHCP

Written By
thumbnail Ryan Naraine
Ryan Naraine
Sep 1, 2020
ServerWatch content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More



A pair of security flaws found in the Internet Systems Consortium’s (ISC) implementation of the DHCP protocol could leave users at risk of denial-of-service or code execution attacks, experts warned Tuesday.

Earlier this week, a pair of security flaws were found in the Internet Systems Consortium’s implementation of the DHCP that could leave users at risk for denial-of-service or code execution attacks.

According to an alert from the U.S. Computer Emergency Response Team (US-CERT), the vulnerabilities were discovered in ISC DHCP versions 3.0.1rc12 and 3.0.1rc13, the de-facto standard for all Unix and Unix-like systems, including Linux and BSD.

“All versions of ISC DCHP 3, including all snapshots, betas, and release candidates, contain the flawed code,” US-CERT cautioned.

DHCP, or Dynamic Host Configuration Protocol, provides a framework for assigning dynamic IP addresses to devices on a network. With dynamic addressing, a device can have a different IP address every time it connects to the network.

The ISC’s freely-distributed reference implementation supplies hosts with network configuration data and allows a DHCP server to dynamically update a DNS server, eliminating the need for manual updates to the name server configuration

The consortium confirmed the existence of the buffer overflow problems in ISC DHCP Daemon versions 3.0.1 Release Candidates 12 and 13 and urged users to upgrade to versions 3.0.1rc14.

It is not the first time the ISC has been forced to issue a fix for buffer overflows in its DHCP implementation. Last January, multiple vulnerabilities were detected
during an internal source code audit.

The ISC is a nonprofit group that develops production quality Open Source reference implementations of core Internet protocols.

This article was originally published on InternetNews.com.

thumbnail Ryan Naraine

Ryan Naraine is a ServerWatch, eSecurity Planet, and eWEEK contributor.

Recommended for you...

What Is a Container? Understanding Containerization
What Is a Print Server? | How It Works and What It Does
Nisar Ahmad
Dec 8, 2023
6 Best Linux Virtualization Software for 2024
What Is a Network Policy Server (NPS)? | Essential Guide
ServerWatch Logo

ServerWatch is a top resource on servers. Explore the latest news, reviews and guides for server administrators now.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.