Количество 18
Количество 18
openSUSE-SU-2018:0827-1
Security update for dhcp
SUSE-SU-2018:0812-1
Security update for dhcp
SUSE-SU-2018:0810-2
Security update for dhcp
SUSE-SU-2018:0810-1
Security update for dhcp
ELSA-2018-0483
ELSA-2018-0483: dhcp security update (IMPORTANT)
ELSA-2018-0469
ELSA-2018-0469: dhcp security update (IMPORTANT)
CVE-2018-5733
A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0.
CVE-2018-5733
A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0.
CVE-2018-5733
A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0.
CVE-2018-5733
A malicious client which is allowed to send very large amounts of traf ...
CVE-2018-5732
Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0
CVE-2018-5732
Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0
CVE-2018-5732
Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0
CVE-2018-5732
Failure to properly bounds-check a buffer used for processing DHCP opt ...
GHSA-j4cm-vph7-f7qg
Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0
GHSA-6f7q-j62j-5545
A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0.
BDU:2018-00357
Уязвимость DHCP-сервера dhcpd, вызванная возможностью переполнения 32-разрядного счетчика ссылок и позволяющая вызвать отказ в обслуживании сервера
BDU:2018-00356
Уязвимость сервера ISC DHCP, связанная с переполнением буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании или получить несанкционированный доступ к конфиденциальным данным
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
openSUSE-SU-2018:0827-1 Security update for dhcp | больше 7 лет назад | |||
SUSE-SU-2018:0812-1 Security update for dhcp | больше 7 лет назад | |||
SUSE-SU-2018:0810-2 Security update for dhcp | больше 7 лет назад | |||
SUSE-SU-2018:0810-1 Security update for dhcp | больше 7 лет назад | |||
ELSA-2018-0483 ELSA-2018-0483: dhcp security update (IMPORTANT) | больше 7 лет назад | |||
ELSA-2018-0469 ELSA-2018-0469: dhcp security update (IMPORTANT) | больше 7 лет назад | |||
CVE-2018-5733 A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0. | CVSS3: 7.5 | 29% Средний | почти 7 лет назад | |
CVE-2018-5733 A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0. | CVSS3: 5.9 | 29% Средний | больше 7 лет назад | |
CVE-2018-5733 A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0. | CVSS3: 7.5 | 29% Средний | почти 7 лет назад | |
CVE-2018-5733 A malicious client which is allowed to send very large amounts of traf ... | CVSS3: 7.5 | 29% Средний | почти 7 лет назад | |
CVE-2018-5732 Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0 | CVSS3: 7.5 | 2% Низкий | около 6 лет назад | |
CVE-2018-5732 Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0 | CVSS3: 7.5 | 2% Низкий | больше 7 лет назад | |
CVE-2018-5732 Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0 | CVSS3: 7.5 | 2% Низкий | около 6 лет назад | |
CVE-2018-5732 Failure to properly bounds-check a buffer used for processing DHCP opt ... | CVSS3: 7.5 | 2% Низкий | около 6 лет назад | |
GHSA-j4cm-vph7-f7qg Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0 | 2% Низкий | больше 3 лет назад | ||
GHSA-6f7q-j62j-5545 A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0. | CVSS3: 7.5 | 29% Средний | больше 3 лет назад | |
BDU:2018-00357 Уязвимость DHCP-сервера dhcpd, вызванная возможностью переполнения 32-разрядного счетчика ссылок и позволяющая вызвать отказ в обслуживании сервера | CVSS3: 7.5 | 29% Средний | почти 8 лет назад | |
BDU:2018-00356 Уязвимость сервера ISC DHCP, связанная с переполнением буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании или получить несанкционированный доступ к конфиденциальным данным | CVSS3: 9.1 | 2% Низкий | почти 8 лет назад |
Уязвимостей на страницу