Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-7912

Опубликовано: 30 июл. 2015
Источник: debian
EPSS Низкий

Описание

The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a large length value of an option in a DHCPACK message.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dhcpcd5fixed6.9.1-1package
dhcpcd5no-dsajessiepackage

Примечания

  • https://dev.marples.name/rDHCc204b018d1cfe740fb3179532070ae10fe34aaf3

EPSS

Процентиль: 66%
0.00524
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a large length value of an option in a DHCPACK message.

nvd
больше 10 лет назад

The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a large length value of an option in a DHCPACK message.

github
больше 3 лет назад

The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a large length value of an option in a DHCPACK message.

EPSS

Процентиль: 66%
0.00524
Низкий