{
    "data_type": "CVE",
    "data_format": "MITRE",
    "data_version": "4.0",
    "CVE_data_meta": {
        "DATE_PUBLIC": "2022-10-05T12:01:00.000Z",
        "ID": "CVE-2022-2929",
        "ASSIGNER": "security-officer@isc.org",
        "STATE": "PUBLIC",
        "TITLE": "DHCP memory leak"
    },
    "affects": {
        "vendor": {
            "vendor_data": [
                {
                    "product": {
                        "product_data": [
                            {
                                "product_name": "ISC DHCP",
                                "version": {
                                    "version_data": [
                                        {
                                            "version_name": "1.0",
                                            "version_value": "1.0 through versions before 4.1-ESV-R16-P2"
                                        },
                                        {
                                            "version_name": "4.2",
                                            "version_value": "4.2 through versions before 4.4.3.-P1"
                                        }
                                    ]
                                }
                            }
                        ]
                    },
                    "vendor_name": "ISC"
                }
            ]
        }
    },
    "credit": [
        {
            "lang": "eng",
            "value": "ISC would like to thank VictorV of Cyber Kunlun Lab for discovering and reporting this issue."
        }
    ],
    "description": {
        "description_data": [
            {
                "lang": "eng",
                "value": "In ISC DHCP 1.0 -> 4.4.3, ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16-P1 a system with access to a DHCP server, sending DHCP packets crafted to include fqdn labels longer than 63 bytes, could eventually cause the server to run out of memory."
            }
        ]
    },
    "exploit": [
        {
            "lang": "eng",
            "value": "We are not aware of any active exploits."
        }
    ],
    "impact": {
        "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
        }
    },
    "problemtype": {
        "problemtype_data": [
            {
                "description": [
                    {
                        "lang": "eng",
                        "value": "The function fqdn_universe_decode() allocates buffer space for the contents of option 81 (fqdn) data received in a DHCP packet. The maximum length of a DNS label is 63 bytes. The function tests the length byte of each label contained in the fqdn; if it finds a label whose length byte value is larger than 63, it returns without dereferencing the buffer space. This will cause a memory leak. Affects In ISC DHCP 1.0 -> 4.4.3, ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16-P1"
                    }
                ]
            }
        ]
    },
    "references": {
        "reference_data": [
            {
                "name": "https://kb.isc.org/docs/cve-2022-2929",
                "refsource": "CONFIRM",
                "url": "https://kb.isc.org/docs/cve-2022-2929"
            },
            {
                "refsource": "MLIST",
                "name": "[debian-lts-announce] 20221010 [SECURITY] [DLA 3146-1] isc-dhcp security update",
                "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00015.html"
            },
            {
                "refsource": "FEDORA",
                "name": "FEDORA-2022-f5a45757df",
                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QQXYCIWUDILRCNBAIMVFCSGXBRKEPB4K/"
            },
            {
                "refsource": "FEDORA",
                "name": "FEDORA-2022-9ca9a94e28",
                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6IBFH4MRRNJQVWEKILQ6I6CXWW766FX/"
            },
            {
                "refsource": "FEDORA",
                "name": "FEDORA-2022-c4f274a54f",
                "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2SARIK7KZ7MGQIWDRWZFAOSQSPXY4GOU/"
            },
            {
                "refsource": "GENTOO",
                "name": "GLSA-202305-22",
                "url": "https://security.gentoo.org/glsa/202305-22"
            }
        ]
    },
    "solution": [
        {
            "lang": "eng",
            "value": "Upgrade to the patched release most closely related to your current version of ISC DHCP. These can all be downloaded from https://www.isc.org/downloads.  4.4.3-P1 4.1-ESV-R16-P2"
        }
    ],
    "source": {
        "discovery": "EXTERNAL"
    },
    "work_around": [
        {
            "lang": "eng",
            "value": "As exploiting this vulnerability requires an attacker to send packets for an extended period of time, restarting servers periodically could be a viable workaround."
        }
    ]
}