Your submission was sent successfully! Close

CVE-2019-5747

Published: 09 January 2019

An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
busybox
Launchpad, Ubuntu, Debian
Upstream
Released (1:1.30.1-2)
Ubuntu 21.04 (Hirsute Hippo)
Released (1:1.27.2-2ubuntu5)
Ubuntu 20.04 LTS (Focal Fossa)
Released (1:1.27.2-2ubuntu5)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (1:1.27.2-2ubuntu3.2)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (1:1.22.0-15ubuntu1.4)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (1:1.21.0-1ubuntu1.4)
Patches:
Upstream: https://git.busybox.net/busybox/commit/?id=74d9f1ba37010face4bd1449df4d60dd84450b06