Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A611E97-A264-4B4C-93CE-7FC01FE5F708", "versionEndIncluding": "4.1.2", "versionStartIncluding": "4.1.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:*", "matchCriteriaId": "257C8915-697E-4274-8BCB-43B690FA5C96", "versionEndExcluding": "4.2.8", "versionStartIncluding": "4.2.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:*", "matchCriteriaId": "341617C4-C370-44AD-9138-14EBB3A758F1", "versionEndExcluding": "4.3.6", "versionStartIncluding": "4.3.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*", "matchCriteriaId": "F27D0660-2F07-430B-A651-5D0B6AA763C0", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:*", "matchCriteriaId": "FBAABA4E-0D34-4644-AC26-E272CEE6C361", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:*", "matchCriteriaId": "179443DC-4B6A-408A-8BE5-B3E72188F43E", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r10b1:*:*:*:*:*:*", "matchCriteriaId": "CA5FAE54-1645-4A38-A431-10E67304399A", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r10rc1:*:*:*:*:*:*", "matchCriteriaId": "2C0D1A71-CECB-4C86-87F6-EB3741BDF692", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r11:*:*:*:*:*:*", "matchCriteriaId": "ADF80D19-3B0A-4A74-944E-F33CCC30EADA", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r11b1:*:*:*:*:*:*", "matchCriteriaId": "9E01D88D-876D-45FE-B7ED-089DAD801EF6", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r11rc1:*:*:*:*:*:*", "matchCriteriaId": "C4B030B1-F008-4562-93C7-7E1C6D3D00F4", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r11rc2:*:*:*:*:*:*", "matchCriteriaId": "FF656F5E-B317-4E0C-BF01-EC2A917142DC", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:*", "matchCriteriaId": "FBA64EEC-C0C7-4F11-8131-2868691E54DB", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r12-p1:*:*:*:*:*:*", "matchCriteriaId": "FFD3109A-1D76-4EA7-BF39-0B203AD945CF", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r12b1:*:*:*:*:*:*", "matchCriteriaId": "2156D1BC-90AE-4AF3-964C-DAC7DCE14A5D", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r13:*:*:*:*:*:*", "matchCriteriaId": "A157E664-6ACE-44CE-AC07-64898B182EA1", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r13b1:*:*:*:*:*:*", "matchCriteriaId": "BA8ADA07-94FA-4014-AF70-8FCAF5F0DB03", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r14:*:*:*:*:*:*", "matchCriteriaId": "1D21F05D-246F-41F5-81FD-286C26168E2E", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r14b1:*:*:*:*:*:*", "matchCriteriaId": "A2E0124D-6330-4013-8145-4309FDAE60A8", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r15:*:*:*:*:*:*", "matchCriteriaId": "924E91FF-495F-4963-827F-57F7340C6560", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r2:*:*:*:*:*:*", "matchCriteriaId": "A5E2FFC7-6E73-463E-846C-C403E41A2022", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r3:*:*:*:*:*:*", "matchCriteriaId": "E9D08285-745D-40AB-9A78-F467712CDA5A", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r3b1:*:*:*:*:*:*", "matchCriteriaId": "C19C3B91-215D-4697-84D9-13CC18445C82", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r4:*:*:*:*:*:*", "matchCriteriaId": "79F235F0-AD16-4E5B-AB60-97F0BB86AEB6", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r5:*:*:*:*:*:*", "matchCriteriaId": "E84D5E5B-0336-4166-AAAC-49375E3AF971", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r5b1:*:*:*:*:*:*", "matchCriteriaId": "4EF0CF57-C49C-4801-B4E1-7D82C3F6E3A2", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r5rc1:*:*:*:*:*:*", "matchCriteriaId": "8290ECB4-3B70-4126-BF10-68A5A863E297", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r5rc2:*:*:*:*:*:*", "matchCriteriaId": "6D35C997-593E-4994-9501-2010D98459D8", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r6:*:*:*:*:*:*", "matchCriteriaId": "65E0296F-3522-4B43-AF34-CFE1AE7EEC1E", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r7:*:*:*:*:*:*", "matchCriteriaId": "69F6E619-A52B-4A60-8247-41ADD0E7D655", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r8:*:*:*:*:*:*", "matchCriteriaId": "AA48EBAA-10B7-43D6-9A27-99F2578DF7F6", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r8b1:*:*:*:*:*:*", "matchCriteriaId": "9421E40A-FF8D-426B-99A0-24DCD8D9B39D", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r8rc1:*:*:*:*:*:*", "matchCriteriaId": "81BB427C-AE69-4BFB-B956-F62373FA1EFC", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r9:*:*:*:*:*:*", "matchCriteriaId": "7DABD43E-818A-4B21-B4E7-753056D4A184", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r9b1:*:*:*:*:*:*", "matchCriteriaId": "7A08F801-2A32-492F-BAB4-8E32E9981CAC", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:r9rc1:*:*:*:*:*:*", "matchCriteriaId": "B2FDBA4F-CDE8-4767-8C41-328FF9ACB2EB", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.1.2:p1:*:*:*:*:*:*", "matchCriteriaId": "CA5D825C-B72A-44F5-AF24-4F3200881ABA", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:dhcp:4.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13C8AD22-6E39-4899-88B2-7ED44BE890A6", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0"}, {"lang": "es", "value": "Un fallo al comprobar apropiadamente los l\u00edmites de un b\u00fafer usado para procesar las opciones de DHCP, permite a un servidor malicioso (o a una entidad que se hace pasar por un servidor) causar un desbordamiento del b\u00fafer (y el bloqueo resultante) en dhclient mediante el env\u00edo de una respuesta que contiene una secci\u00f3n de opciones especialmente construida. Afecta a ISC DHCP versiones 4.1.0 hasta 4.1-ESV-R15, 4.2.0 hasta 4.2.8, 4.3.0 hasta 4.3.6, y 4.4.0."}], "id": "CVE-2018-5732", "lastModified": "2024-11-21T04:09:16.440", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "security-officer@isc.org", "type": "Secondary"}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-10-09T16:15:13.407", "references": [{"source": "security-officer@isc.org", "tags": ["Vendor Advisory"], "url": "https://kb.isc.org/docs/aa-01565"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://kb.isc.org/docs/aa-01565"}], "sourceIdentifier": "security-officer@isc.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-119"}], "source": "nvd@nist.gov", "type": "Primary"}]}