An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-3935-1 | BusyBox vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 09 Jun 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-06-09T15:26:04.926Z
Reserved: 2019-01-09T00:00:00.000Z
Link: CVE-2018-20679
Updated: 2024-08-05T12:05:17.686Z
Status : Modified
Published: 2019-01-09T16:29:00.273
Modified: 2025-06-09T16:15:29.090
Link: CVE-2018-20679
OpenCVE Enrichment
No data.
Ubuntu USN