Vulnerability Details : CVE-2018-5733
A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0.
Vulnerability category: Overflow
Products affected by CVE-2018-5733
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1.0:-:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r5_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc2:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r10_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r11_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc2:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r12_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r7:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r8:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r8_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r8_rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r9:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r9_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r9_rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r10_rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r11:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r12_p1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r13:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r13_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r14:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r14_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r15:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.4.0:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-5733
7.92%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-5733
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
5.9
|
MEDIUM | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.2
|
3.6
|
Internet Systems Consortium (ISC) | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2018-5733
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-5733
-
http://www.securitytracker.com/id/1040437
Dhcp Reference Counter Overflow Lets Remote Users Cause the Target dhcpd Service to Crash - SecurityTrackerThird Party Advisory;VDB Entry
-
https://access.redhat.com/errata/RHSA-2018:0469
RHSA-2018:0469 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/03/msg00015.html
[SECURITY] [DLA 1313-1] isc-dhcp security updateThird Party Advisory
-
https://usn.ubuntu.com/3586-2/
USN-3586-2: DHCP vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://usn.ubuntu.com/3586-1/
USN-3586-1: DHCP vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://www.debian.org/security/2018/dsa-4133
Debian -- Security Information -- DSA-4133-1 isc-dhcpThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:0483
RHSA-2018:0483 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://kb.isc.org/docs/aa-01567
CVE-2018-5733: A malicious client can overflow a reference counter in ISC dhcpd - Security AdvisoriesVendor Advisory
-
http://www.securityfocus.com/bid/103188
ISC DHCP CVE-2018-5733 Remote Denial of Service VulnerabilityThird Party Advisory;VDB Entry
Jump to