<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">dhcp-4.3.3.P1-3.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10358-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">dhcp-4.3.3.P1-3.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the dhcp-4.3.3.P1-3.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10358</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-1892/</URL>
      <Description>SUSE CVE CVE-2009-1892 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-2156/</URL>
      <Description>SUSE CVE CVE-2010-2156 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-3611/</URL>
      <Description>SUSE CVE CVE-2010-3611 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-3616/</URL>
      <Description>SUSE CVE CVE-2010-3616 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-0413/</URL>
      <Description>SUSE CVE CVE-2011-0413 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-0997/</URL>
      <Description>SUSE CVE CVE-2011-0997 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-2748/</URL>
      <Description>SUSE CVE CVE-2011-2748 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-2749/</URL>
      <Description>SUSE CVE CVE-2011-2749 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-4539/</URL>
      <Description>SUSE CVE CVE-2011-4539 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-4868/</URL>
      <Description>SUSE CVE CVE-2011-4868 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-3570/</URL>
      <Description>SUSE CVE CVE-2012-3570 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-3571/</URL>
      <Description>SUSE CVE CVE-2012-3571 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-3954/</URL>
      <Description>SUSE CVE CVE-2012-3954 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-3955/</URL>
      <Description>SUSE CVE CVE-2012-3955 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2266/</URL>
      <Description>SUSE CVE CVE-2013-2266 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8605/</URL>
      <Description>SUSE CVE CVE-2015-8605 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="dhcp-4.3.3.P1-3.1">
      <FullProductName ProductID="dhcp-4.3.3.P1-3.1">dhcp-4.3.3.P1-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dhcp-client-4.3.3.P1-3.1">
      <FullProductName ProductID="dhcp-client-4.3.3.P1-3.1">dhcp-client-4.3.3.P1-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dhcp-devel-4.3.3.P1-3.1">
      <FullProductName ProductID="dhcp-devel-4.3.3.P1-3.1">dhcp-devel-4.3.3.P1-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dhcp-doc-4.3.3.P1-3.1">
      <FullProductName ProductID="dhcp-doc-4.3.3.P1-3.1">dhcp-doc-4.3.3.P1-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dhcp-relay-4.3.3.P1-3.1">
      <FullProductName ProductID="dhcp-relay-4.3.3.P1-3.1">dhcp-relay-4.3.3.P1-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dhcp-server-4.3.3.P1-3.1">
      <FullProductName ProductID="dhcp-server-4.3.3.P1-3.1">dhcp-server-4.3.3.P1-3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="dhcp-4.3.3.P1-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1">dhcp-4.3.3.P1-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dhcp-client-4.3.3.P1-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1">dhcp-client-4.3.3.P1-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dhcp-devel-4.3.3.P1-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1">dhcp-devel-4.3.3.P1-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dhcp-doc-4.3.3.P1-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1">dhcp-doc-4.3.3.P1-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dhcp-relay-4.3.3.P1-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1">dhcp-relay-4.3.3.P1-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dhcp-server-4.3.3.P1-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1">dhcp-server-4.3.3.P1-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">dhcpd in ISC DHCP 3.0.4 and 3.1.1, when the dhcp-client-identifier and hardware ethernet configuration settings are both used, allows remote attackers to cause a denial of service (daemon crash) via unspecified requests.</Note>
    </Notes>
    <CVE>CVE-2009-1892</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-1892.html</URL>
        <Description>CVE-2009-1892</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/519413</URL>
        <Description>SUSE Bug 519413</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ISC DHCP 4.1 before 4.1.1-P1 and 4.0 before 4.0.2-P1 allows remote attackers to cause a denial of service (server exit) via a zero-length client ID.</Note>
    </Notes>
    <CVE>CVE-2010-2156</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-2156.html</URL>
        <Description>CVE-2010-2156</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/612546</URL>
        <Description>SUSE Bug 612546</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ISC DHCP server 4.0 before 4.0.2, 4.1 before 4.1.2, and 4.2 before 4.2.0-P1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a DHCPv6 packet containing a Relay-Forward message without an address in the Relay-Forward link-address field.</Note>
    </Notes>
    <CVE>CVE-2010-3611</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-3611.html</URL>
        <Description>CVE-2010-3611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/650902</URL>
        <Description>SUSE Bug 650902</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/667655</URL>
        <Description>SUSE Bug 667655</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ISC DHCP server 4.2 before 4.2.0-P2, when configured to use failover partnerships, allows remote attackers to cause a denial of service (communications-interrupted state and DHCP client service loss) by connecting to a port that is only intended for a failover peer, as demonstrated by a Nagios check_tcp process check to TCP port 520.</Note>
    </Notes>
    <CVE>CVE-2010-3616</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-3616.html</URL>
        <Description>CVE-2010-3616</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/659059</URL>
        <Description>SUSE Bug 659059</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DHCPv6 server in ISC DHCP 4.0.x and 4.1.x before 4.1.2-P1, 4.0-ESV and 4.1-ESV before 4.1-ESV-R1, and 4.2.x before 4.2.1b1 allows remote attackers to cause a denial of service (assertion failure and daemon crash) by sending a message over IPv6 for a declined and abandoned address.</Note>
    </Notes>
    <CVE>CVE-2011-0413</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-0413.html</URL>
        <Description>CVE-2011-0413</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/667655</URL>
        <Description>SUSE Bug 667655</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/680298</URL>
        <Description>SUSE Bug 680298</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.</Note>
    </Notes>
    <CVE>CVE-2011-0997</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-0997.html</URL>
        <Description>CVE-2011-0997</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/675052</URL>
        <Description>SUSE Bug 675052</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/689182</URL>
        <Description>SUSE Bug 689182</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/708527</URL>
        <Description>SUSE Bug 708527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/715172</URL>
        <Description>SUSE Bug 715172</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.</Note>
    </Notes>
    <CVE>CVE-2011-2748</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-2748.html</URL>
        <Description>CVE-2011-2748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/712653</URL>
        <Description>SUSE Bug 712653</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.</Note>
    </Notes>
    <CVE>CVE-2011-2749</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-2749.html</URL>
        <Description>CVE-2011-2749</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/712653</URL>
        <Description>SUSE Bug 712653</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.</Note>
    </Notes>
    <CVE>CVE-2011-4539</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-4539.html</URL>
        <Description>CVE-2011-4539</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/735610</URL>
        <Description>SUSE Bug 735610</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/741239</URL>
        <Description>SUSE Bug 741239</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The logging functionality in dhcpd in ISC DHCP before 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets related to a lease-status update.</Note>
    </Notes>
    <CVE>CVE-2011-4868</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.1</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-4868.html</URL>
        <Description>CVE-2011-4868</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/741239</URL>
        <Description>SUSE Bug 741239</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.</Note>
    </Notes>
    <CVE>CVE-2012-3570</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.7</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-3570.html</URL>
        <Description>CVE-2012-3570</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/772924</URL>
        <Description>SUSE Bug 772924</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ISC DHCP 4.1.2 through 4.2.4 and 4.1-ESV before 4.1-ESV-R6 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed client identifier.</Note>
    </Notes>
    <CVE>CVE-2012-3571</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.1</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-3571.html</URL>
        <Description>CVE-2012-3571</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/772924</URL>
        <Description>SUSE Bug 772924</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory leaks in ISC DHCP 4.1.x and 4.2.x before 4.2.4-P1 and 4.1-ESV before 4.1-ESV-R6 allow remote attackers to cause a denial of service (memory consumption) by sending many requests.</Note>
    </Notes>
    <CVE>CVE-2012-3954</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-3954.html</URL>
        <Description>CVE-2012-3954</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/772924</URL>
        <Description>SUSE Bug 772924</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ISC DHCP 4.1.x before 4.1-ESV-R7 and 4.2.x before 4.2.4-P2 allows remote attackers to cause a denial of service (daemon crash) in opportunistic circumstances by establishing an IPv6 lease in an environment where the lease expiration time is later reduced.</Note>
    </Notes>
    <CVE>CVE-2012-3955</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-3955.html</URL>
        <Description>CVE-2012-3955</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/780167</URL>
        <Description>SUSE Bug 780167</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.</Note>
    </Notes>
    <CVE>CVE-2013-2266</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2266.html</URL>
        <Description>CVE-2013-2266</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/811876</URL>
        <Description>SUSE Bug 811876</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/811934</URL>
        <Description>SUSE Bug 811934</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ISC DHCP 4.x before 4.1-ESV-R12-P1, 4.2.x, and 4.3.x before 4.3.3-P1 allows remote attackers to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet.</Note>
    </Notes>
    <CVE>CVE-2015-8605</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.7</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5.7</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8605.html</URL>
        <Description>CVE-2015-8605</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961305</URL>
        <Description>SUSE Bug 961305</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
