Description
The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a large length value of an option in a DHCPACK message.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-506-1 | dhcpcd5 security update |
EUVD |
EUVD-2014-7762 | The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a large length value of an option in a DHCPACK message. |
References
History
No history.
Status: PUBLISHED
Assigner: Chrome
Published:
Updated: 2024-08-06T13:03:27.657Z
Reserved: 2014-10-06T00:00:00.000Z
Link: CVE-2014-7912
No data.
Status : Deferred
Published: 2015-07-30T00:59:00.163
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-7912
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD