Your submission was sent successfully! Close

CVE-2018-20679

Published: 09 January 2019

An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.

Priority

Low

CVSS 3 base score: 7.5

Status

Package Release Status
busybox
Launchpad, Ubuntu, Debian
Upstream
Released (1:1.30.1-2)
Ubuntu 21.04 (Hirsute Hippo)
Released (1:1.27.2-2ubuntu5)
Ubuntu 20.04 LTS (Focal Fossa)
Released (1:1.27.2-2ubuntu5)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (1:1.27.2-2ubuntu3.2)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (1:1.22.0-15ubuntu1.4)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (1:1.21.0-1ubuntu1.4)
Patches:
Upstream: https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c