CERT mailing list archives

ISC Releases Security Advisory for Kea DHCP


From: "US-CERT" <US-CERT () ncas us-cert gov>
Date: Thu, 12 Jul 2018 04:06:59 -0500

U.S. Department of Homeland Security US-CERT

National Cyber Awareness System:



ISC Releases Security Advisory for Kea DHCP [ 
https://www.us-cert.gov/ncas/current-activity/2018/07/12/ISC-Releases-Security-Advisory-Kea-DHCP ] 07/12/2018 03:12 AM 
EDT 
Original release date: July 12, 2018

The Internet Systems Consortium (ISC) has released a security advisory that addresses a memory leak vulnerability in 
Kea DHCP 1.4.0. A remote attacker could exploit this vulnerability to cause a denial-of-service condition.

NCCIC encourages users and administrators to review ISC Knowledge Base Article AA-01626  [ 
https://kb.isc.org/article/AA-01626 ]and apply the necessary update or workaround.

________________________________________________________________________

This product is provided subject to this Notification [ http://www.us-cert.gov/privacy/notification ] and this Privacy 
& Use [ http://www.us-cert.gov/privacy/ ] policy.

body { font-size: 1em; font-family: Arial, Verdana, sans-serif; font-weight: normal; font-style: normal; color: 
#333333; } ________________________________________________________________________

A copy of this publication is available at www.us-cert.gov [ https://www.us-cert.gov ]. If you need help or have 
questions, please send an email to info () us-cert gov. Do not reply to this message since this email was sent from a 
notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT () 
ncas us-cert gov to your address book. 

OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ 
http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ 
http://www.us-cert.gov/related-resources ]  

STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ] 


Current thread: