Your submission was sent successfully! Close

CVE-2018-20679

Published: 9 January 2019

An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.

Notes

AuthorNote
mdeslaur
this fix is incomplete, see CVE-2019-5747
Priority

Low

CVSS 3 base score: 7.5

Status

Package Release Status
busybox
Launchpad, Ubuntu, Debian
bionic
Released (1:1.27.2-2ubuntu3.2)
cosmic
Released (1:1.27.2-2ubuntu4.1)
disco
Released (1:1.27.2-2ubuntu5)
eoan
Released (1:1.27.2-2ubuntu5)
focal
Released (1:1.27.2-2ubuntu5)
groovy
Released (1:1.27.2-2ubuntu5)
hirsute
Released (1:1.27.2-2ubuntu5)
precise Ignored
(end of ESM support, was needed)
trusty
Released (1:1.21.0-1ubuntu1.4)
upstream
Released (1:1.30.1-2)
xenial
Released (1:1.22.0-15ubuntu1.4)
Patches:
upstream: https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c