Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-20679

Опубликовано: 09 янв. 2019
Источник: debian
EPSS Низкий

Описание

An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
busyboxfixed1:1.30.1-1package
busyboxno-dsastretchpackage
busyboxno-dsajessiepackage

Примечания

  • https://bugs.busybox.net/show_bug.cgi?id=11506

  • https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c

  • When fixing this issue make sure to not open CVE-2019-5747 by only

  • applying the partial fix. The followup commit

  • https://git.busybox.net/busybox/commit/?id=74d9f1ba37010face4bd1449df4d60dd84450b06

  • is needed to fix the issue completely.

EPSS

Процентиль: 93%
0.09589
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 7 лет назад

An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.

CVSS3: 4.3
redhat
около 7 лет назад

An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.

CVSS3: 7.5
nvd
около 7 лет назад

An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.

CVSS3: 7.5
github
больше 3 лет назад

An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.

suse-cvrf
больше 4 лет назад

Security update for busybox

EPSS

Процентиль: 93%
0.09589
Низкий