Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-1503

Опубликовано: 18 апр. 2016
Источник: debian
EPSS Низкий

Описание

dhcpcd before 6.10.0, as used in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 and other products, mismanages option lengths, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a malformed DHCP response, aka internal bug 26461634.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dhcpcd5fixed6.10.1-1package
dhcpcd5not-affectedjessiepackage
dhcpcd5not-affectedwheezypackage
dhcpcdnot-affectedpackage

Примечания

  • https://dev.marples.name/rDHC1475a702df74b120db847991bc011e3441a045b8

  • https://www.openwall.com/lists/oss-security/2016/01/07/3

  • dhcpcd 3.2.3-<rev> in squeeze and wheezy differ very much from dhcpcd5 in later Debian versions.

EPSS

Процентиль: 93%
0.09383
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 10 лет назад

dhcpcd before 6.10.0, as used in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 and other products, mismanages option lengths, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a malformed DHCP response, aka internal bug 26461634.

CVSS3: 9.8
nvd
почти 10 лет назад

dhcpcd before 6.10.0, as used in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 and other products, mismanages option lengths, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a malformed DHCP response, aka internal bug 26461634.

CVSS3: 9.8
github
больше 3 лет назад

dhcpcd before 6.10.0, as used in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 and other products, mismanages option lengths, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a malformed DHCP response, aka internal bug 26461634.

fstec
почти 10 лет назад

Уязвимость свободной реализации DHCP-клиента dhcpcd, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

EPSS

Процентиль: 93%
0.09383
Низкий