Unrated severityNVD Advisory· Published Jan 16, 2019· Updated Apr 25, 2025
A malicious client can overflow a reference counter in ISC dhcpd
CVE-2018-5733
Description
A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0.
Affected products
17- osv-coords16 versionspkg:rpm/opensuse/dhcp&distro=openSUSE%20Tumbleweedpkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/dhcp&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3
< 4.4.2.P1-2.4+ 15 more
- (no CPE)range: < 4.4.2.P1-2.4
- (no CPE)range: < 4.3.3-10.14.1
- (no CPE)range: < 4.3.3-10.14.1
- (no CPE)range: < 4.2.4.P2-0.28.8.1
- (no CPE)range: < 4.2.4.P2-0.28.8.1
- (no CPE)range: < 4.2.4.P2-0.28.8.1
- (no CPE)range: < 4.2.4.P2-0.28.8.1
- (no CPE)range: < 4.3.3-10.14.1
- (no CPE)range: < 4.3.3-10.14.1
- (no CPE)range: < 4.3.3-10.14.1
- (no CPE)range: < 4.2.4.P2-0.28.8.1
- (no CPE)range: < 4.3.3-10.14.1
- (no CPE)range: < 4.3.3-10.14.1
- (no CPE)range: < 4.2.4.P2-0.28.8.1
- (no CPE)range: < 4.3.3-10.14.1
- (no CPE)range: < 4.3.3-10.14.1
- ISC/ISC DHCPv5Range: ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- access.redhat.com/errata/RHSA-2018:0469mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:0483mitrevendor-advisoryx_refsource_REDHAT
- usn.ubuntu.com/3586-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3586-2/mitrevendor-advisoryx_refsource_UBUNTU
- www.debian.org/security/2018/dsa-4133mitrevendor-advisoryx_refsource_DEBIAN
- www.securityfocus.com/bid/103188mitrevdb-entryx_refsource_BID
- www.securitytracker.com/id/1040437mitrevdb-entryx_refsource_SECTRACK
- kb.isc.org/docs/aa-01567mitrex_refsource_CONFIRM
- lists.debian.org/debian-lts-announce/2018/03/msg00015.htmlmitremailing-listx_refsource_MLIST
News mentions
0No linked articles in our index yet.