CVE-2018-5733
Severity CVSS v4.0:
Pending analysis
Type:
CWE-190
Integer Overflow or Wraparound
Publication date:
16/01/2019
Last modified:
25/04/2025
Description
A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:* | 4.2.0 (including) | 4.2.8 (including) |
cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:* | 4.3.0 (including) | 4.3.6 (including) |
cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:* | ||
cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:* | ||
cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:* | ||
cpe:2.3:a:isc:dhcp:4.1-esv:r10_b1:*:*:*:*:*:* | ||
cpe:2.3:a:isc:dhcp:4.1-esv:r10_rc1:*:*:*:*:*:* | ||
cpe:2.3:a:isc:dhcp:4.1-esv:r11:*:*:*:*:*:* | ||
cpe:2.3:a:isc:dhcp:4.1-esv:r11_b1:*:*:*:*:*:* | ||
cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc1:*:*:*:*:*:* | ||
cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc2:*:*:*:*:*:* | ||
cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:* | ||
cpe:2.3:a:isc:dhcp:4.1-esv:r12_b1:*:*:*:*:*:* | ||
cpe:2.3:a:isc:dhcp:4.1-esv:r12_p1:*:*:*:*:*:* | ||
cpe:2.3:a:isc:dhcp:4.1-esv:r13:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/103188
- http://www.securitytracker.com/id/1040437
- https://access.redhat.com/errata/RHSA-2018:0469
- https://access.redhat.com/errata/RHSA-2018:0483
- https://kb.isc.org/docs/aa-01567
- https://lists.debian.org/debian-lts-announce/2018/03/msg00015.html
- https://usn.ubuntu.com/3586-1/
- https://usn.ubuntu.com/3586-2/
- https://www.debian.org/security/2018/dsa-4133
- http://www.securityfocus.com/bid/103188
- http://www.securitytracker.com/id/1040437
- https://access.redhat.com/errata/RHSA-2018:0469
- https://access.redhat.com/errata/RHSA-2018:0483
- https://kb.isc.org/docs/aa-01567
- https://lists.debian.org/debian-lts-announce/2018/03/msg00015.html
- https://security.netapp.com/advisory/ntap-20250425-0010/
- https://usn.ubuntu.com/3586-1/
- https://usn.ubuntu.com/3586-2/
- https://www.debian.org/security/2018/dsa-4133