Unrated severityNVD Advisory· Published Oct 9, 2019· Updated Sep 16, 2024
A specially constructed response from a malicious server can cause a buffer overflow in dhclient
CVE-2018-5732
Description
Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0
Affected products
17- osv-coords16 versionspkg:rpm/opensuse/dhcp&distro=openSUSE%20Tumbleweedpkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3
< 4.4.2.P1-2.4+ 15 more
- (no CPE)range: < 4.4.2.P1-2.4
- (no CPE)range: < 4.3.3-10.14.1
- (no CPE)range: < 4.3.3-10.14.1
- (no CPE)range: < 4.2.4.P2-0.28.8.1
- (no CPE)range: < 4.2.4.P2-0.28.8.1
- (no CPE)range: < 4.2.4.P2-0.28.8.1
- (no CPE)range: < 4.2.4.P2-0.28.8.1
- (no CPE)range: < 4.3.3-10.14.1
- (no CPE)range: < 4.3.3-10.14.1
- (no CPE)range: < 4.3.3-10.14.1
- (no CPE)range: < 4.2.4.P2-0.28.8.1
- (no CPE)range: < 4.3.3-10.14.1
- (no CPE)range: < 4.3.3-10.14.1
- (no CPE)range: < 4.2.4.P2-0.28.8.1
- (no CPE)range: < 4.3.3-10.14.1
- (no CPE)range: < 4.3.3-10.14.1
- ISC/ISC DHCPv5Range: ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- kb.isc.org/docs/aa-01565mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.