{"id":"USN-3586-1","summary":"isc-dhcp vulnerabilities","details":"Konstantin Orekhov discovered that the DHCP server incorrectly handled a\nlarge number of concurrent TCP sessions. A remote attacker could possibly\nuse this issue to cause a denial of service. This issue only affected\nUbuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-2774)\n\nIt was discovered that the DHCP server incorrectly handled socket\ndescriptors. A remote attacker could possibly use this issue to cause a\ndenial of service. (CVE-2017-3144)\n\nFelix Wilhelm discovered that the DHCP client incorrectly handled certain\nmalformed responses. A remote attacker could use this issue to cause the\nDHCP client to crash, resulting in a denial of service, or possibly execute\narbitrary code. In the default installation, attackers would be isolated by\nthe dhclient AppArmor profile. (CVE-2018-5732)\n\nFelix Wilhelm discovered that the DHCP server incorrectly handled reference\ncounting. A remote attacker could possibly use this issue to cause the DHCP\nserver to crash, resulting in a denial of service. (CVE-2018-5733)\n","modified":"2026-02-10T04:41:17Z","published":"2018-03-01T17:47:25Z","related":["UBUNTU-CVE-2016-2774","UBUNTU-CVE-2017-3144","UBUNTU-CVE-2018-5732","UBUNTU-CVE-2018-5733"],"upstream":["CVE-2016-2774","CVE-2017-3144","CVE-2018-5732","CVE-2018-5733","UBUNTU-CVE-2016-2774","UBUNTU-CVE-2017-3144","UBUNTU-CVE-2018-5732","UBUNTU-CVE-2018-5733"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3586-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2774"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-3144"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-5732"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-5733"}],"affected":[{"package":{"name":"isc-dhcp","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/isc-dhcp@4.2.4-7ubuntu12.12?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.2.4-7ubuntu12.12"}]}],"versions":["4.2.4-7ubuntu8","4.2.4-7ubuntu9","4.2.4-7ubuntu10","4.2.4-7ubuntu11","4.2.4-7ubuntu12","4.2.4-7ubuntu12.1","4.2.4-7ubuntu12.2","4.2.4-7ubuntu12.3","4.2.4-7ubuntu12.4","4.2.4-7ubuntu12.5","4.2.4-7ubuntu12.6","4.2.4-7ubuntu12.7","4.2.4-7ubuntu12.8","4.2.4-7ubuntu12.9","4.2.4-7ubuntu12.10"],"ecosystem_specific":{"binaries":[{"binary_version":"4.2.4-7ubuntu12.12","binary_name":"isc-dhcp-client"},{"binary_version":"4.2.4-7ubuntu12.12","binary_name":"isc-dhcp-client-noddns"},{"binary_version":"4.2.4-7ubuntu12.12","binary_name":"isc-dhcp-common"},{"binary_version":"4.2.4-7ubuntu12.12","binary_name":"isc-dhcp-dev"},{"binary_version":"4.2.4-7ubuntu12.12","binary_name":"isc-dhcp-relay"},{"binary_version":"4.2.4-7ubuntu12.12","binary_name":"isc-dhcp-server"},{"binary_version":"4.2.4-7ubuntu12.12","binary_name":"isc-dhcp-server-ldap"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3586-1.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-2774"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-3144"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-5732"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-5733"}]}}},{"package":{"name":"isc-dhcp","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/isc-dhcp@4.3.3-5ubuntu12.9?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.3.3-5ubuntu12.9"}]}],"versions":["4.3.1-5ubuntu3","4.3.1-5ubuntu4","4.3.1-5ubuntu5","4.3.3-5ubuntu1","4.3.3-5ubuntu2","4.3.3-5ubuntu4","4.3.3-5ubuntu5","4.3.3-5ubuntu7","4.3.3-5ubuntu8","4.3.3-5ubuntu9","4.3.3-5ubuntu10","4.3.3-5ubuntu11","4.3.3-5ubuntu12","4.3.3-5ubuntu12.1","4.3.3-5ubuntu12.3","4.3.3-5ubuntu12.4","4.3.3-5ubuntu12.6","4.3.3-5ubuntu12.7"],"ecosystem_specific":{"binaries":[{"binary_version":"4.3.3-5ubuntu12.9","binary_name":"isc-dhcp-client"},{"binary_version":"4.3.3-5ubuntu12.9","binary_name":"isc-dhcp-client-ddns"},{"binary_version":"4.3.3-5ubuntu12.9","binary_name":"isc-dhcp-common"},{"binary_version":"4.3.3-5ubuntu12.9","binary_name":"isc-dhcp-dev"},{"binary_version":"4.3.3-5ubuntu12.9","binary_name":"isc-dhcp-relay"},{"binary_version":"4.3.3-5ubuntu12.9","binary_name":"isc-dhcp-server"},{"binary_version":"4.3.3-5ubuntu12.9","binary_name":"isc-dhcp-server-ldap"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3586-1.json","cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-2774"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-3144"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-5732"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-5733"}]}}}],"schema_version":"1.7.3"}