Lucene search

K
nvd[email protected]NVD:CVE-2018-5733
HistoryJan 16, 2019 - 8:29 p.m.

CVE-2018-5733

2019-01-1620:29:00
CWE-190
web.nvd.nist.gov

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.6 Medium

AI Score

Confidence

High

0.065 Low

EPSS

Percentile

93.8%

A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0.

Affected configurations

NVD
Node
iscdhcpRange4.2.04.2.8
OR
iscdhcpRange4.3.04.3.6
OR
iscdhcpMatch4.1-esv-
OR
iscdhcpMatch4.1-esvr1
OR
iscdhcpMatch4.1-esvr10
OR
iscdhcpMatch4.1-esvr10_b1
OR
iscdhcpMatch4.1-esvr10_rc1
OR
iscdhcpMatch4.1-esvr11
OR
iscdhcpMatch4.1-esvr11_b1
OR
iscdhcpMatch4.1-esvr11_rc1
OR
iscdhcpMatch4.1-esvr11_rc2
OR
iscdhcpMatch4.1-esvr12
OR
iscdhcpMatch4.1-esvr12_b1
OR
iscdhcpMatch4.1-esvr12_p1
OR
iscdhcpMatch4.1-esvr13
OR
iscdhcpMatch4.1-esvr13_b1
OR
iscdhcpMatch4.1-esvr14
OR
iscdhcpMatch4.1-esvr14_b1
OR
iscdhcpMatch4.1-esvr15
OR
iscdhcpMatch4.1-esvr2
OR
iscdhcpMatch4.1-esvr3
OR
iscdhcpMatch4.1-esvr3_b1
OR
iscdhcpMatch4.1-esvr4
OR
iscdhcpMatch4.1-esvr5
OR
iscdhcpMatch4.1-esvr5_b1
OR
iscdhcpMatch4.1-esvr5_rc1
OR
iscdhcpMatch4.1-esvr5_rc2
OR
iscdhcpMatch4.1-esvr6
OR
iscdhcpMatch4.1-esvr7
OR
iscdhcpMatch4.1-esvr8
OR
iscdhcpMatch4.1-esvr8_b1
OR
iscdhcpMatch4.1-esvr8_rc1
OR
iscdhcpMatch4.1-esvr9
OR
iscdhcpMatch4.1-esvr9_b1
OR
iscdhcpMatch4.1-esvr9_rc1
OR
iscdhcpMatch4.1-esvrc1
OR
iscdhcpMatch4.1.0-
OR
iscdhcpMatch4.4.0
Node
redhatenterprise_linux_desktopMatch6.0
OR
redhatenterprise_linux_desktopMatch7.0
OR
redhatenterprise_linux_serverMatch6.0
OR
redhatenterprise_linux_serverMatch7.0
OR
redhatenterprise_linux_server_ausMatch7.4
OR
redhatenterprise_linux_server_ausMatch7.6
OR
redhatenterprise_linux_server_eusMatch7.4
OR
redhatenterprise_linux_server_eusMatch7.5
OR
redhatenterprise_linux_server_eusMatch7.6
OR
redhatenterprise_linux_workstationMatch6.0
OR
redhatenterprise_linux_workstationMatch7.0
Node
canonicalubuntu_linuxMatch14.04lts
OR
canonicalubuntu_linuxMatch16.04lts
OR
canonicalubuntu_linuxMatch17.10
Node
debiandebian_linuxMatch7.0
OR
debiandebian_linuxMatch8.0
OR
debiandebian_linuxMatch9.0

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.6 Medium

AI Score

Confidence

High

0.065 Low

EPSS

Percentile

93.8%