The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a large length value of an option in a DHCPACK message.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-506-1 | dhcpcd5 security update |
EUVD |
EUVD-2014-7762 | The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a large length value of an option in a DHCPACK message. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: Chrome
Published:
Updated: 2024-08-06T13:03:27.657Z
Reserved: 2014-10-06T00:00:00
Link: CVE-2014-7912
No data.
Status : Deferred
Published: 2015-07-30T00:59:00.163
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-7912
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD