2
0
mirror of https://gitlab.isc.org/isc-projects/dhcp synced 2025-08-31 14:25:41 +00:00

Previously the server code was relaxed to allow packets with zero

length client ids to be processed.  Under some situations use of
zero length client ids can cause the server to go into an infinite
loop.  As such ids are not valid according to RFC 2132 section 9.14
the server no longer accepts them.  Client ids with a length of 1
are also invalid but the server still accepts them in order to
minimize disruption.  The restriction will likely be tightened in
the future to disallow ids with a length of 1.
Thanks to Markus Hietava of Codenomicon CROSS project for the
finding this issue and CERT-FI for vulnerability coordination.
[ISC-Bugs #29851]
CVE: CVE-2012-3571
This commit is contained in:
Shawn Routhier
2012-06-27 21:20:19 +00:00
parent 32e651c418
commit de87ffe336
3 changed files with 65 additions and 5 deletions

View File

@@ -1835,6 +1835,8 @@ void do_packet6(struct interface_info *, const char *,
int, int, const struct iaddr *, isc_boolean_t);
int packet6_len_okay(const char *, int);
int validate_packet(struct packet *);
int add_option(struct option_state *options,
unsigned int option_num,
void *data,