CVE-2019-5747
Published: 9 January 2019
An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
busybox Launchpad, Ubuntu, Debian |
bionic |
Released
(1:1.27.2-2ubuntu3.2)
|
cosmic |
Released
(1:1.27.2-2ubuntu4.1)
|
|
disco |
Released
(1:1.27.2-2ubuntu5)
|
|
eoan |
Released
(1:1.27.2-2ubuntu5)
|
|
focal |
Released
(1:1.27.2-2ubuntu5)
|
|
groovy |
Released
(1:1.27.2-2ubuntu5)
|
|
hirsute |
Released
(1:1.27.2-2ubuntu5)
|
|
precise |
Ignored
(end of ESM support, was needed)
|
|
trusty |
Released
(1:1.21.0-1ubuntu1.4)
|
|
upstream |
Released
(1:1.30.1-2)
|
|
xenial |
Released
(1:1.22.0-15ubuntu1.4)
|
|
Patches: upstream: https://git.busybox.net/busybox/commit/?id=74d9f1ba37010face4bd1449df4d60dd84450b06 |