Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354 - | |
References | () http://secunia.com/advisories/27160 - Vendor Advisory | |
References | () http://secunia.com/advisories/27273 - Vendor Advisory | |
References | () http://secunia.com/advisories/27338 - Vendor Advisory | |
References | () http://secunia.com/advisories/27350 - Vendor Advisory | |
References | () http://secunia.com/advisories/32668 - Vendor Advisory | |
References | () http://securitytracker.com/id?1021157 - | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1 - | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1 - | |
References | () http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962 - | |
References | () http://www.debian.org/security/2007/dsa-1388 - | |
References | () http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.c - Patch | |
References | () http://www.openbsd.org/errata40.html#016_dhcpd - Patch | |
References | () http://www.openbsd.org/errata41.html#010_dhcpd - Patch | |
References | () http://www.openbsd.org/errata42.html#001_dhcpd - Patch | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0970.html - | |
References | () http://www.securityfocus.com/archive/1/482085/100/100/threaded - | |
References | () http://www.securityfocus.com/archive/1/483230/100/100/threaded - | |
References | () http://www.securityfocus.com/bid/25984 - Patch | |
References | () http://www.securityfocus.com/bid/32213 - | |
References | () http://www.securitytracker.com/id?1018794 - | |
References | () http://www.ubuntu.com/usn/usn-531-1 - | |
References | () http://www.ubuntu.com/usn/usn-531-2 - | |
References | () http://www.vupen.com/english/advisories/2008/3088 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/37045 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5817 - | |
References | () https://www.exploit-db.com/exploits/4601 - |
Information
Published : 2007-10-11 10:17
Updated : 2024-11-21 00:37
NVD link : CVE-2007-5365
Mitre link : CVE-2007-5365
CVE.ORG link : CVE-2007-5365
JSON object : View
Products Affected
debian
- debian_linux
sun
- opensolaris
- solaris
openbsd
- openbsd
redhat
- enterprise_linux
- linux_advanced_workstation
ubuntu
- ubuntu_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer