CVE-2014-7912

Source
https://nvd.nist.gov/vuln/detail/CVE-2014-7912
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2014-7912.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2014-7912
Related
Published
2015-07-30T00:59:00Z
Modified
2024-11-21T02:18:15Z
Summary
[none]
Details

The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a large length value of an option in a DHCPACK message.

References

Affected packages

Debian:11 / dhcpcd5

Package

Name
dhcpcd5
Purl
pkg:deb/debian/dhcpcd5?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.9.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / dhcpcd5

Package

Name
dhcpcd5
Purl
pkg:deb/debian/dhcpcd5?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.9.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}