This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Dhcpcd Project First view 2015-07-29
Product Dhcpcd Last view 2019-05-05
Version 4.0.8 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:dhcpcd_project:dhcpcd

Activity : Overall

Related : CVE

  Date Alert Description
9.8 2019-05-05 CVE-2019-11766

dhcp6.c in dhcpcd before 6.11.7 and 7.x before 7.2.2 has a buffer over-read in the D6_OPTION_PD_EXCLUDE feature.

5.3 2019-04-28 CVE-2019-11579

dhcp.c in dhcpcd before 7.2.1 contains a 1-byte read overflow with DHO_OPTSOVERLOADED.

5.9 2019-04-28 CVE-2019-11578

auth.c in dhcpcd before 7.2.1 allowed attackers to infer secrets by performing latency attacks.

9.8 2019-04-28 CVE-2019-11577

dhcpcd before 7.2.1 contains a buffer overflow in dhcp6_findna in dhcp6.c when reading NA/TA addresses.

7.5 2017-02-07 CVE-2016-1504

dhcpcd before 6.10.0 allows remote attackers to cause a denial of service (invalid read and crash) via vectors related to the option length.

9.8 2016-04-17 CVE-2016-1503

dhcpcd before 6.10.0, as used in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 and other products, mismanages option lengths, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a malformed DHCP response, aka internal bug 26461634.

6.8 2015-07-29 CVE-2014-7913

The print_option function in dhcp-common.c in dhcpcd through 6.9.1, as used in dhcp.c in dhcpcd 5.x in Android before 5.1 and other products, misinterprets the return value of the snprintf function, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted message.

6.8 2015-07-29 CVE-2014-7912

The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a large length value of an option in a DHCPACK message.

CWE : Common Weakness Enumeration

%idName
62% (5) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
25% (2) CWE-125 Out-of-bounds Read
12% (1) CWE-203 Information Exposure Through Discrepancy

Nessus® Vulnerability Scanner

id Description
2016-06-20 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201606-07.nasl - Type: ACT_GATHER_INFO
2016-06-07 Name: The remote Debian host is missing a security update.
File: debian_DLA-506.nasl - Type: ACT_GATHER_INFO
2016-04-18 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_092156c904d711e6b1ce002590263bf5.nasl - Type: ACT_GATHER_INFO
2016-04-18 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_6ec9f210040411e69aeebc5ff4fb5ea1.nasl - Type: ACT_GATHER_INFO
2016-01-08 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_df587aa2b5a511e59728002590263bf5.nasl - Type: ACT_GATHER_INFO