First published: Wed Feb 28 2018(Updated: )
A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Versions of DHCP affected: 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0
Credit: security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/dhcp | <4.1 | 4.1 |
redhat/dhcp | <4.3.6 | 4.3.6 |
redhat/dhcp | <4.4.1 | 4.4.1 |
debian/isc-dhcp | 4.4.1-2.3+deb11u2 4.4.1-2.3+deb11u1 4.4.3-P1-2 4.4.3-P1-5 | |
ISC DHCP Server | >=4.2.0<=4.2.8 | |
ISC DHCP Server | >=4.3.0<=4.3.6 | |
ISC DHCP Server | =4.1-esv | |
ISC DHCP Server | =4.1-esv-r1 | |
ISC DHCP Server | =4.1-esv-r10 | |
ISC DHCP Server | =4.1-esv-r10_b1 | |
ISC DHCP Server | =4.1-esv-r10_rc1 | |
ISC DHCP Server | =4.1-esv-r11 | |
ISC DHCP Server | =4.1-esv-r11_b1 | |
ISC DHCP Server | =4.1-esv-r11_rc1 | |
ISC DHCP Server | =4.1-esv-r11_rc2 | |
ISC DHCP Server | =4.1-esv-r12 | |
ISC DHCP Server | =4.1-esv-r12_b1 | |
ISC DHCP Server | =4.1-esv-r12_p1 | |
ISC DHCP Server | =4.1-esv-r13 | |
ISC DHCP Server | =4.1-esv-r13_b1 | |
ISC DHCP Server | =4.1-esv-r14 | |
ISC DHCP Server | =4.1-esv-r14_b1 | |
ISC DHCP Server | =4.1-esv-r15 | |
ISC DHCP Server | =4.1-esv-r2 | |
ISC DHCP Server | =4.1-esv-r3 | |
ISC DHCP Server | =4.1-esv-r3_b1 | |
ISC DHCP Server | =4.1-esv-r4 | |
ISC DHCP Server | =4.1-esv-r5 | |
ISC DHCP Server | =4.1-esv-r5_b1 | |
ISC DHCP Server | =4.1-esv-r5_rc1 | |
ISC DHCP Server | =4.1-esv-r5_rc2 | |
ISC DHCP Server | =4.1-esv-r6 | |
ISC DHCP Server | =4.1-esv-r7 | |
ISC DHCP Server | =4.1-esv-r8 | |
ISC DHCP Server | =4.1-esv-r8_b1 | |
ISC DHCP Server | =4.1-esv-r8_rc1 | |
ISC DHCP Server | =4.1-esv-r9 | |
ISC DHCP Server | =4.1-esv-r9_b1 | |
ISC DHCP Server | =4.1-esv-r9_rc1 | |
ISC DHCP Server | =4.1-esv-rc1 | |
ISC DHCP Server | =4.1.0 | |
ISC DHCP Server | =4.4.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server eus | =7.4 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =17.10 | |
Debian | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 |
Upgrade to the patched release most closely related to your current version of DHCP. DHCP 4.1-ESV-R15-P1 DHCP 4.3.6-P1 DHCP 4.4.1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5733 is considered a high severity vulnerability as it can lead to the crash of a DHCP server.
To fix CVE-2018-5733, upgrade the DHCP server software to versions 4.1.1 or later, or apply the necessary patches provided by your distribution.
CVE-2018-5733 affects ISC DHCP versions 4.1.0 through 4.2.8 as well as specific versions up to 4.3.6 and 4.4.1.
An attacker could exploit CVE-2018-5733 by sending a large volume of traffic to overwhelm the DHCP server, potentially leading to service disruptions.
No, CVE-2018-5733 does not involve remote code execution; it can cause a denial of service by crashing the DHCP service instead.