Summary
Detail | |||
---|---|---|---|
Vendor | Dhcpcd Project | First view | 2015-07-29 |
Product | Dhcpcd | Last view | 2019-05-05 |
Version | 4.0.8 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:dhcpcd_project:dhcpcd |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.8 | 2019-05-05 | CVE-2019-11766 | dhcp6.c in dhcpcd before 6.11.7 and 7.x before 7.2.2 has a buffer over-read in the D6_OPTION_PD_EXCLUDE feature. |
5.3 | 2019-04-28 | CVE-2019-11579 | dhcp.c in dhcpcd before 7.2.1 contains a 1-byte read overflow with DHO_OPTSOVERLOADED. |
5.9 | 2019-04-28 | CVE-2019-11578 | auth.c in dhcpcd before 7.2.1 allowed attackers to infer secrets by performing latency attacks. |
9.8 | 2019-04-28 | CVE-2019-11577 | dhcpcd before 7.2.1 contains a buffer overflow in dhcp6_findna in dhcp6.c when reading NA/TA addresses. |
7.5 | 2017-02-07 | CVE-2016-1504 | dhcpcd before 6.10.0 allows remote attackers to cause a denial of service (invalid read and crash) via vectors related to the option length. |
9.8 | 2016-04-17 | CVE-2016-1503 | dhcpcd before 6.10.0, as used in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 and other products, mismanages option lengths, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a malformed DHCP response, aka internal bug 26461634. |
6.8 | 2015-07-29 | CVE-2014-7913 | The print_option function in dhcp-common.c in dhcpcd through 6.9.1, as used in dhcp.c in dhcpcd 5.x in Android before 5.1 and other products, misinterprets the return value of the snprintf function, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted message. |
6.8 | 2015-07-29 | CVE-2014-7912 | The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a large length value of an option in a DHCPACK message. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
62% (5) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
25% (2) | CWE-125 | Out-of-bounds Read |
12% (1) | CWE-203 | Information Exposure Through Discrepancy |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2016-06-20 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201606-07.nasl - Type: ACT_GATHER_INFO |
2016-06-07 | Name: The remote Debian host is missing a security update. File: debian_DLA-506.nasl - Type: ACT_GATHER_INFO |
2016-04-18 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_092156c904d711e6b1ce002590263bf5.nasl - Type: ACT_GATHER_INFO |
2016-04-18 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_6ec9f210040411e69aeebc5ff4fb5ea1.nasl - Type: ACT_GATHER_INFO |
2016-01-08 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_df587aa2b5a511e59728002590263bf5.nasl - Type: ACT_GATHER_INFO |