{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35819?format=json","vulnerability_id":"VCID-b2gd-p3qx-37eh","summary":"Multiple vulnerabilities have been found in ISC DHCP, the worst of\n    which may allow remote Denial of Service.","aliases":[{"alias":"CVE-2012-3954"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925727?format=json","purl":"pkg:deb/debian/isc-dhcp@4.2.4-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.2.4-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1035589?format=json","purl":"pkg:deb/debian/isc-dhcp@4.3.1-6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-nyv5-m9g6-kqb3"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-yf9w-gpqd-2yga"},{"vulnerability":"VCID-zkkh-dw89-23gg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.3.1-6"},{"url":"http://public2.vulnerablecode.io/api/packages/925717?format=json","purl":"pkg:deb/debian/isc-dhcp@4.4.1-2.3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.4.1-2.3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925715?format=json","purl":"pkg:deb/debian/isc-dhcp@4.4.3-P1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.4.3-P1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925718?format=json","purl":"pkg:deb/debian/isc-dhcp@4.4.3-P1-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.4.3-P1-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/74223?format=json","purl":"pkg:ebuild/net-misc/dhcp@4.2.4_p2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/dhcp@4.2.4_p2"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572024?format=json","purl":"pkg:deb/debian/isc-dhcp@4.1.1-P1-15%2Bsqueeze8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-1uby-b9re-hqg2"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-5v14-pk3f-7ye1"},{"vulnerability":"VCID-6n54-npev-97ep"},{"vulnerability":"VCID-7w4b-sk4v-3bd8"},{"vulnerability":"VCID-b2gd-p3qx-37eh"},{"vulnerability":"VCID-e4yf-gnwv-4bap"},{"vulnerability":"VCID-g3ma-agz7-eka4"},{"vulnerability":"VCID-hjry-zy32-vfcp"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-m3fx-k6et-ykg3"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-nyv5-m9g6-kqb3"},{"vulnerability":"VCID-qg1j-mnkq-s3b1"},{"vulnerability":"VCID-rm9p-arpx-6qdu"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-wc57-hq32-vfgn"},{"vulnerability":"VCID-yf9w-gpqd-2yga"},{"vulnerability":"VCID-zkkh-dw89-23gg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.1.1-P1-15%252Bsqueeze8"},{"url":"http://public2.vulnerablecode.io/api/packages/572025?format=json","purl":"pkg:deb/debian/isc-dhcp@4.1.1-P1-15%2Bsqueeze10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-1uby-b9re-hqg2"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-5v14-pk3f-7ye1"},{"vulnerability":"VCID-6n54-npev-97ep"},{"vulnerability":"VCID-7w4b-sk4v-3bd8"},{"vulnerability":"VCID-b2gd-p3qx-37eh"},{"vulnerability":"VCID-e4yf-gnwv-4bap"},{"vulnerability":"VCID-g3ma-agz7-eka4"},{"vulnerability":"VCID-hjry-zy32-vfcp"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-m3fx-k6et-ykg3"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-nyv5-m9g6-kqb3"},{"vulnerability":"VCID-qg1j-mnkq-s3b1"},{"vulnerability":"VCID-rm9p-arpx-6qdu"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-wc57-hq32-vfgn"},{"vulnerability":"VCID-yf9w-gpqd-2yga"},{"vulnerability":"VCID-zkkh-dw89-23gg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.1.1-P1-15%252Bsqueeze10"},{"url":"http://public2.vulnerablecode.io/api/packages/572026?format=json","purl":"pkg:deb/debian/isc-dhcp@4.2.2.dfsg.1-5%2Bdeb70u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nnm-zxf3-3bhd"},{"vulnerability":"VCID-3qwn-cc1f-8bht"},{"vulnerability":"VCID-5e1d-48v5-7kfy"},{"vulnerability":"VCID-6n54-npev-97ep"},{"vulnerability":"VCID-7w4b-sk4v-3bd8"},{"vulnerability":"VCID-b2gd-p3qx-37eh"},{"vulnerability":"VCID-g3ma-agz7-eka4"},{"vulnerability":"VCID-hubm-k681-pkb1"},{"vulnerability":"VCID-n362-tq55-tkha"},{"vulnerability":"VCID-nyv5-m9g6-kqb3"},{"vulnerability":"VCID-rm9p-arpx-6qdu"},{"vulnerability":"VCID-vwd3-4x2n-ckfv"},{"vulnerability":"VCID-wc57-hq32-vfgn"},{"vulnerability":"VCID-yf9w-gpqd-2yga"},{"vulnerability":"VCID-zkkh-dw89-23gg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/isc-dhcp@4.2.2.dfsg.1-5%252Bdeb70u8"},{"url":"http://public2.vulnerablecode.io/api/packages/125881?format=json","purl":"pkg:rpm/redhat/dhcp@12:4.1.1-31.P1.el6_3?arch=1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b2gd-p3qx-37eh"},{"vulnerability":"VCID-g3ma-agz7-eka4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dhcp@12:4.1.1-31.P1.el6_3%3Farch=1"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3954.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3954.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3954","reference_id":"","reference_type":"","scores":[{"value":"0.0446","scoring_system":"epss","scoring_elements":"0.89125","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0446","scoring_system":"epss","scoring_elements":"0.89141","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0446","scoring_system":"epss","scoring_elements":"0.89152","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0446","scoring_system":"epss","scoring_elements":"0.89148","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0446","scoring_system":"epss","scoring_elements":"0.89158","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0446","scoring_system":"epss","scoring_elements":"0.89176","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0446","scoring_system":"epss","scoring_elements":"0.89186","published_at":"2026-05-15T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90605","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90623","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.9062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.9056","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90633","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90635","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.9063","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90617","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90564","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90575","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90583","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90594","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.90601","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05909","scoring_system":"epss","scoring_elements":"0.9061","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3954"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686174","reference_id":"686174","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686174"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=842428","reference_id":"842428","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=842428"},{"reference_url":"https://security.gentoo.org/glsa/201301-06","reference_id":"GLSA-201301-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1141","reference_id":"RHSA-2012:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1141"},{"reference_url":"https://usn.ubuntu.com/1519-1/","reference_id":"USN-1519-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1519-1/"}],"weaknesses":[{"cwe_id":401,"name":"Missing Release of Memory after Effective Lifetime","description":"The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory."}],"exploits":[],"severity_range_score":null,"exploitability":"0.5","weighted_severity":"0.1","risk_score":0.1,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b2gd-p3qx-37eh"}