A denial of service flaw was found in the way libdns library implementation of BIND processed certain requests. A DHCP client could issue a specially-crafted DHCP protocol request that, when processed would lead to excessive memory consumption (memory exhaustion) at the side of the DHCP server process, possibly leading to its crash. References: [1] https://kb.isc.org/article/AA-00880 [2] ftp://ftp.isc.org/isc/dhcp/4.2.5-P1/dhcp-4.2.5-P1-RELNOTES
Release notes indicate: - A security issue in Bind9 was found and fixed. This release includes the fixed Bind9 code. There have been no code changes to the DHCP code. [ISC-Bugs #32688] CVE: CVE-2013-2266 DHCP update upgrades used Bind version to fix CVE-2013-2266 (bug 928027). There should be no separate CVE id assigned for DHCP just because it's different application that uses/embeds vulnerable Bind code.
Fedora dhcp builds remove embed bind source and link against system libdns: http://pkgs.fedoraproject.org/cgit/dhcp.git/tree/dhcp.spec?id=4a364d130b918caed6d357fd5a1fcc2c35926851#n176
Statement: Not Vulnerable. This issue does not affect the version of dhcp as shipped with Red Hat Enterprise Linux 5 and 6.
*** This bug has been marked as a duplicate of bug 928027 ***
This issue does not affect the version of dhcp as shipped with Fedora 17 and Fedora 18. More details in comment #7