Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2019-5747

Published: 9 January 2019

An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
busybox
Launchpad, Ubuntu, Debian
bionic
Released (1:1.27.2-2ubuntu3.2)
cosmic
Released (1:1.27.2-2ubuntu4.1)
disco
Released (1:1.27.2-2ubuntu5)
eoan
Released (1:1.27.2-2ubuntu5)
focal
Released (1:1.27.2-2ubuntu5)
groovy
Released (1:1.27.2-2ubuntu5)
hirsute
Released (1:1.27.2-2ubuntu5)
precise Ignored
(end of ESM support, was needed)
trusty
Released (1:1.21.0-1ubuntu1.4)
upstream
Released (1:1.30.1-2)
xenial
Released (1:1.22.0-15ubuntu1.4)
Patches:
upstream: https://git.busybox.net/busybox/commit/?id=74d9f1ba37010face4bd1449df4d60dd84450b06