Ask the Community
Groups
CVE-2018-5732 dhcp: Buffer overflow in dhclient possibly allowing code execution triggered by malicious server - Connect IT Community | Kaseya
<main> <article class="userContent"> <h3 data-id="cve-id"><strong>CVE ID</strong></h3> <p>CVE-2018-5732</p> <h3 data-id="description"><strong>DESCRIPTION</strong></h3> <p>An out-of-bound memory access flaw was found in the way dhclient processed a DHCP response packet. A malicious DHCP server could potentially use this flaw to crash dhclient processes running on DHCP client machines via a crafted DHCP response packet.<br><br>CVSS3 Base Score 7.5</p> <h3 data-id="resolution"><strong>RESOLUTION</strong></h3> <p> Apply Unitrends security update v10.26 from 03/09/2018 or later,<br> containing dhclient-4.1.1-53.P1.el6.centos.1<br> </p> <h3 data-id="link-to-advisories"><strong>LINK TO ADVISORIES</strong></h3> <p></p> <ul><li><a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2Fcve-2018-5732%250D%250Ahttps%3A%2F%2Faccess.redhat.com%2Ferrata%2FRHSA-2018%3A0469%250D%250Ahttp%3A%2F%2Fweb.nvd.nist.gov%2Fview%2Fvuln%2Fdetail%3FvulnId%3DCVE-2018-5732">https://access.redhat.com/security/cve/cve-2018-5732 https://access.redhat.com/errata/RHSA-2018:0469 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5732</a></li></ul> </article> </main>