An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Systemd | Systemd_project | 245 (including) | 245 (including) |
Red Hat Enterprise Linux 8 | RedHat | NetworkManager-1:1.32.10-4.el8 | * |
Red Hat Enterprise Linux 8 | RedHat | NetworkManager-1:1.32.10-4.el8 | * |
Systemd | Ubuntu | bionic | * |
Systemd | Ubuntu | devel | * |
Systemd | Ubuntu | esm-infra-legacy/trusty | * |
Systemd | Ubuntu | esm-infra/xenial | * |
Systemd | Ubuntu | focal | * |
Systemd | Ubuntu | groovy | * |
Systemd | Ubuntu | hirsute | * |
Systemd | Ubuntu | impish | * |
Systemd | Ubuntu | jammy | * |
Systemd | Ubuntu | kinetic | * |
Systemd | Ubuntu | lunar | * |
Systemd | Ubuntu | mantic | * |
Systemd | Ubuntu | noble | * |
Systemd | Ubuntu | oracular | * |
Systemd | Ubuntu | trusty | * |
Systemd | Ubuntu | trusty/esm | * |
Systemd | Ubuntu | xenial | * |