Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-5365

Опубликовано: 11 окт. 2007
Источник: ubuntu
Приоритет: high
EPSS Средний
CVSS2: 7.2

Описание

Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.

РелизСтатусПримечание
dapper

released

2.0pl5-19.4ubuntu0.2
devel

DNE

edgy

released

2.0pl5-19.4ubuntu1.2
feisty

released

2.0pl5-19.5ubuntu2.2
gutsy

released

2.0pl5dfsg1-20ubuntu1.2
upstream

needed

Показывать по

EPSS

Процентиль: 97%
0.41631
Средний

7.2 High

CVSS2

Связанные уязвимости

redhat
почти 18 лет назад

Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.

nvd
почти 18 лет назад

Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.

debian
почти 18 лет назад

Stack-based buffer overflow in the cons_options function in options.c ...

github
больше 3 лет назад

Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.

fstec
больше 10 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 97%
0.41631
Средний

7.2 High

CVSS2