CVE-2018-5732

Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
iscCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 84%
VendorProductVersion
iscdhcp
4.1.0 ≤
𝑥
≤ 4.1.2
iscdhcp
4.2.0 ≤
𝑥
< 4.2.8
iscdhcp
4.3.0 ≤
𝑥
< 4.3.6
iscdhcp
4.1-esv
iscdhcp
4.1-esv:r1
iscdhcp
4.1-esv:r10
iscdhcp
4.1-esv:r10b1
iscdhcp
4.1-esv:r10rc1
iscdhcp
4.1-esv:r11
iscdhcp
4.1-esv:r11b1
iscdhcp
4.1-esv:r11rc1
iscdhcp
4.1-esv:r11rc2
iscdhcp
4.1-esv:r12
iscdhcp
4.1-esv:r12-p1
iscdhcp
4.1-esv:r12b1
iscdhcp
4.1-esv:r13
iscdhcp
4.1-esv:r13b1
iscdhcp
4.1-esv:r14
iscdhcp
4.1-esv:r14b1
iscdhcp
4.1-esv:r15
iscdhcp
4.1-esv:r2
iscdhcp
4.1-esv:r3
iscdhcp
4.1-esv:r3b1
iscdhcp
4.1-esv:r4
iscdhcp
4.1-esv:r5
iscdhcp
4.1-esv:r5b1
iscdhcp
4.1-esv:r5rc1
iscdhcp
4.1-esv:r5rc2
iscdhcp
4.1-esv:r6
iscdhcp
4.1-esv:r7
iscdhcp
4.1-esv:r8
iscdhcp
4.1-esv:r8b1
iscdhcp
4.1-esv:r8rc1
iscdhcp
4.1-esv:r9
iscdhcp
4.1-esv:r9b1
iscdhcp
4.1-esv:r9rc1
iscdhcp
4.1.2:p1
iscdhcp
4.4.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
isc-dhcp
bullseye
4.4.1-2.3+deb11u2
fixed
bullseye (security)
4.4.1-2.3+deb11u1
fixed
bookworm
4.4.3-P1-2
fixed
sid
4.4.3-P1-5
fixed
trixie
4.4.3-P1-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
isc-dhcp
bionic
Fixed 4.3.5-3ubuntu5
released
artful
Fixed 4.3.5-3ubuntu2.2
released
xenial
Fixed 4.3.3-5ubuntu12.9
released
trusty
Fixed 4.2.4-7ubuntu12.12
released