Vulnerability Details : CVE-2018-5733
A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0.
Vulnerability category: Overflow
Exploit prediction scoring system (EPSS) score for CVE-2018-5733
Probability of exploitation activity in the next 30 days: 11.34%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 94 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2018-5733
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
nvd@nist.gov |
5.9
|
MEDIUM | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.2
|
3.6
|
security-officer@isc.org |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
nvd@nist.gov |
CWE ids for CVE-2018-5733
-
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-5733
-
http://www.securitytracker.com/id/1040437
Dhcp Reference Counter Overflow Lets Remote Users Cause the Target dhcpd Service to Crash - SecurityTrackerThird Party Advisory;VDB Entry
-
https://access.redhat.com/errata/RHSA-2018:0469
RHSA-2018:0469 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/03/msg00015.html
[SECURITY] [DLA 1313-1] isc-dhcp security updateThird Party Advisory
-
https://usn.ubuntu.com/3586-2/
USN-3586-2: DHCP vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://usn.ubuntu.com/3586-1/
USN-3586-1: DHCP vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://www.debian.org/security/2018/dsa-4133
Debian -- Security Information -- DSA-4133-1 isc-dhcpThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:0483
RHSA-2018:0483 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://kb.isc.org/docs/aa-01567
CVE-2018-5733: A malicious client can overflow a reference counter in ISC dhcpd - Security AdvisoriesVendor Advisory
-
http://www.securityfocus.com/bid/103188
ISC DHCP CVE-2018-5733 Remote Denial of Service VulnerabilityThird Party Advisory;VDB Entry
Products affected by CVE-2018-5733
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r3_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1.0:-:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r5_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r5_rc2:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r10_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r11_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc2:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r12_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r7:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r8:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r8_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r8_rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r9:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r9_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r9_rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r10_rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r11:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r12_p1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r13:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r13_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r14:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r14_b1:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1-esv:r15:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.4.0:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*