UBUNTU-CVE-2016-1503

Source
https://ubuntu.com/security/CVE-2016-1503
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-1503.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2016-1503
Upstream
Published
2016-04-18T00:59:00Z
Modified
2025-07-16T07:17:45.577939Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

dhcpcd before 6.10.0, as used in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 and other products, mismanages option lengths, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a malformed DHCP response, aka internal bug 26461634.

References

Affected packages

Ubuntu:Pro:14.04:LTS / dhcpcd5

Package

Name
dhcpcd5
Purl
pkg:deb/ubuntu/dhcpcd5@6.0.5-2+deb8u1build0.14.04.1~esm1?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.5.6-1

6.*

6.0.5-1ubuntu1
6.0.5-1.1
6.0.5-2build0.14.04.1
6.0.5-2+deb8u1build0.14.04.1~esm1

Ubuntu:16.04:LTS / dhcpcd5

Package

Name
dhcpcd5
Purl
pkg:deb/ubuntu/dhcpcd5@6.10.1-1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.10.1-1

Affected versions

6.*

6.9.1-1
6.9.3-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "dhcpcd5",
            "binary_version": "6.10.1-1"
        },
        {
            "binary_name": "dhcpcd5-dbgsym",
            "binary_version": "6.10.1-1"
        }
    ],
    "availability": "No subscription required"
}