Description
Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
Vendor Solution
Upgrade to the patched release most closely related to your current version of DHCP. ISC DHCP releases are available from https://www.isc.org/downloads. >= DHCP 4.1-ESV-R15-P1 >= DHCP 4.3.6-P1 >= DHCP 4.4.1
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1313-1 | isc-dhcp security update |
Debian DSA |
DSA-4133-1 | isc-dhcp security update |
EUVD |
EUVD-2018-17501 | Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0 |
Ubuntu USN |
USN-3586-1 | DHCP vulnerabilities |
Ubuntu USN |
USN-3586-2 | DHCP vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: isc
Published:
Updated: 2024-09-16T18:19:36.136Z
Reserved: 2018-01-17T00:00:00.000Z
Link: CVE-2018-5732
No data.
Status : Modified
Published: 2019-10-09T16:15:13.407
Modified: 2024-11-21T04:09:16.440
Link: CVE-2018-5732
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN