A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1313-1 | isc-dhcp security update |
Debian DSA |
DSA-4133-1 | isc-dhcp security update |
Ubuntu USN |
USN-3586-1 | DHCP vulnerabilities |
Ubuntu USN |
USN-3586-2 | DHCP vulnerabilities |
Fixes
Solution
Upgrade to the patched release most closely related to your current version of DHCP. DHCP 4.1-ESV-R15-P1 DHCP 4.3.6-P1 DHCP 4.4.1
Workaround
No workaround given by the vendor.
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 25 Apr 2025 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: isc
Published:
Updated: 2025-04-25T23:02:52.084Z
Reserved: 2018-01-17T00:00:00.000Z
Link: CVE-2018-5733
No data.
Status : Modified
Published: 2019-01-16T20:29:00.753
Modified: 2025-04-25T23:15:15.590
Link: CVE-2018-5733
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN