First published: Wed Feb 28 2018(Updated: )
Failure to properly bounds check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Versions of DHCP affected: 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0
Credit: security-officer@isc.org security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/dhcp | <4.1 | 4.1 |
redhat/dhcp | <4.3.6 | 4.3.6 |
redhat/dhcp | <4.4.1 | 4.4.1 |
debian/isc-dhcp | 4.4.1-2.3+deb11u2 4.4.1-2.3+deb11u1 4.4.3-P1-2 4.4.3-P1-5 | |
ISC DHCP Server | >=4.1.0<=4.1.2 | |
ISC DHCP Server | >=4.2.0<4.2.8 | |
ISC DHCP Server | >=4.3.0<4.3.6 | |
ISC DHCP Server | =4.1-esv | |
ISC DHCP Server | =4.1-esv-r1 | |
ISC DHCP Server | =4.1-esv-r10 | |
ISC DHCP Server | =4.1-esv-r10b1 | |
ISC DHCP Server | =4.1-esv-r10rc1 | |
ISC DHCP Server | =4.1-esv-r11 | |
ISC DHCP Server | =4.1-esv-r11b1 | |
ISC DHCP Server | =4.1-esv-r11rc1 | |
ISC DHCP Server | =4.1-esv-r11rc2 | |
ISC DHCP Server | =4.1-esv-r12 | |
ISC DHCP Server | =4.1-esv-r12-p1 | |
ISC DHCP Server | =4.1-esv-r12b1 | |
ISC DHCP Server | =4.1-esv-r13 | |
ISC DHCP Server | =4.1-esv-r13b1 | |
ISC DHCP Server | =4.1-esv-r14 | |
ISC DHCP Server | =4.1-esv-r14b1 | |
ISC DHCP Server | =4.1-esv-r15 | |
ISC DHCP Server | =4.1-esv-r2 | |
ISC DHCP Server | =4.1-esv-r3 | |
ISC DHCP Server | =4.1-esv-r3b1 | |
ISC DHCP Server | =4.1-esv-r4 | |
ISC DHCP Server | =4.1-esv-r5 | |
ISC DHCP Server | =4.1-esv-r5b1 | |
ISC DHCP Server | =4.1-esv-r5rc1 | |
ISC DHCP Server | =4.1-esv-r5rc2 | |
ISC DHCP Server | =4.1-esv-r6 | |
ISC DHCP Server | =4.1-esv-r7 | |
ISC DHCP Server | =4.1-esv-r8 | |
ISC DHCP Server | =4.1-esv-r8b1 | |
ISC DHCP Server | =4.1-esv-r8rc1 | |
ISC DHCP Server | =4.1-esv-r9 | |
ISC DHCP Server | =4.1-esv-r9b1 | |
ISC DHCP Server | =4.1-esv-r9rc1 | |
ISC DHCP Server | =4.1.2-p1 | |
ISC DHCP Server | =4.4.0 |
Upgrade to the patched release most closely related to your current version of DHCP. ISC DHCP releases are available from https://www.isc.org/downloads. >= DHCP 4.1-ESV-R15-P1 >= DHCP 4.3.6-P1 >= DHCP 4.4.1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-5732 is high with a CVSS score of 7.5.
CVE-2018-5732 affects ISC DHCP versions 4.1.0 to 4.1.2, 4.2.0 to 4.2.8, and 4.3.0 to 4.3.6.
Ubuntu versions 12.04 LTS (Precise Pangolin), 14.04 LTS (Trusty Tahr), 16.04 LTS (Xenial Xerus), and 18.04 LTS (Bionic Beaver) are affected by CVE-2018-5732 in the ISC DHCP package.
Red Hat is affected by CVE-2018-5732 in the dhcp package versions 4.1, 4.3.6, and 4.4.1.
The CWE of CVE-2018-5732 is CWE-119, which refers to Improper Restriction of Operations within the Bounds of a Memory Buffer.