{"vulnerability": "rhsa-2018:0469", "sightings": [{"uuid": "aec02421-8a51-4486-b4fd-60e5cb2bbd3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "RHSA-2018:0469", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13561", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2018-5733\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -&gt; 4.1-ESV-R15, 4.2.0 -&gt; 4.2.8, 4.3.0 -&gt; 4.3.6, 4.4.0.\n\ud83d\udccf Published: 2019-01-16T20:00:00.000Z\n\ud83d\udccf Modified: 2025-04-25T23:02:52.084Z\n\ud83d\udd17 References:\n1. https://kb.isc.org/docs/aa-01567\n2. https://access.redhat.com/errata/RHSA-2018:0469\n3. https://www.debian.org/security/2018/dsa-4133\n4. https://usn.ubuntu.com/3586-2/\n5. https://access.redhat.com/errata/RHSA-2018:0483\n6. https://usn.ubuntu.com/3586-1/\n7. http://www.securityfocus.com/bid/103188\n8. http://www.securitytracker.com/id/1040437\n9. https://lists.debian.org/debian-lts-announce/2018/03/msg00015.html", "creation_timestamp": "2025-04-26T00:07:37.000000Z"}]}