A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0.
{
"versions": [
{
"introduced": "4.2.0"
},
{
"last_affected": "4.2.8"
},
{
"introduced": "4.3.0"
},
{
"last_affected": "4.3.6"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-NA"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r10"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r10_b1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r10_rc1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r11"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r11_b1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r11_rc1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r11_rc2"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r12"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r12_b1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r12_p1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r13"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r13_b1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r14"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r14_b1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r15"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r2"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r3"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r3_b1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r4"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r5"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r5_b1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r5_rc1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r5_rc2"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r6"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r7"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r8"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r8_b1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r8_rc1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r9"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r9_b1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-r9_rc1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.0-NA"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.0"
}
]
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-5733.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.1-esv-rc1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "14.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "17.10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
}
]