Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x566-m9mc-f47w

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In FreeBSD 12.1-STABLE before r365010, 11.4-STABLE before r365011, 12.1-RELEASE before p9, 11.4-RELEASE before p3, and 11.3-RELEASE before p13, dhclient(8) fails to handle certain malformed input related to handling of DHCP option 119 resulting a heap overflow. The heap overflow could in principle be exploited to achieve remote code execution. The affected process runs with reduced privileges in a Capsicum sandbox, limiting the immediate impact of an exploit.

In FreeBSD 12.1-STABLE before r365010, 11.4-STABLE before r365011, 12.1-RELEASE before p9, 11.4-RELEASE before p3, and 11.3-RELEASE before p13, dhclient(8) fails to handle certain malformed input related to handling of DHCP option 119 resulting a heap overflow. The heap overflow could in principle be exploited to achieve remote code execution. The affected process runs with reduced privileges in a Capsicum sandbox, limiting the immediate impact of an exploit.

EPSS

Процентиль: 94%
0.13439
Средний

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 7.3
nvd
почти 5 лет назад

In FreeBSD 12.1-STABLE before r365010, 11.4-STABLE before r365011, 12.1-RELEASE before p9, 11.4-RELEASE before p3, and 11.3-RELEASE before p13, dhclient(8) fails to handle certain malformed input related to handling of DHCP option 119 resulting a heap overflow. The heap overflow could in principle be exploited to achieve remote code execution. The affected process runs with reduced privileges in a Capsicum sandbox, limiting the immediate impact of an exploit.

CVSS3: 7.3
fstec
почти 5 лет назад

Уязвимость опции DHCP 119 операционных систем FreeBSD, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 94%
0.13439
Средний

Дефекты

CWE-787