Page 2 of 16 results (0.009 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

12 Mar 2015 — The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a large length value of an option in a DHCPACK message. Vulnerabilidad en la función get_option en dhcp.c en las versiones de dhcpcd anteriores a la 6.2.0, usado en dhcpcd 5.x, en Android en versio... • http://www.securitytracker.com/id/1033124 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 96EXPL: 0

03 Sep 2014 — The get_option function in dhcpcd 4.0.0 through 6.x before 6.4.3 allows remote DHCP servers to cause a denial of service by resetting the DHO_OPTIONSOVERLOADED option in the (1) bootfile or (2) servername section, which triggers the option to be processed again. La función get_option en dhcpcd 4.0.0 hasta 6.x anterior a 6.4.3 permite a servidores DHCP remotos causar una denegación de servicio mediante la restablecimiento de la opción DHO_OPTIONSOVERLOADED en la sección (1) bootfile o (2) servername, lo que ... • http://advisories.mageia.org/MGASA-2014-0334.html • CWE-399: Resource Management Errors •

CVSS: 9.8EPSS: 3%CPEs: 1EXPL: 0

25 Jul 2012 — Stack-based buffer overflow in the get_packet method in socket.c in dhcpcd 3.2.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long packet. Desbordamiento de búfer basado en pila en el método de get_packet socket.c en dhcpcd v3.2.3 permite a atacantes remotos causar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de un paquete de gran longitud. • http://www.debian.org/security/2012/dsa-2498 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

13 Apr 2011 — dhcpcd before 5.2.12 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message. dhcpcd antes de v5.2.12 permite a atacantes remotos ejecutar comandos de su elección vía metacaracteres encubiertos en un nombre de host obtenido a partir de un mensaje DHCP. • http://roy.marples.name/archives/dhcpcd-discuss/2011/0326.html • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

11 Jul 2005 — The dhcpcd DHCP client before 1.3.22 allows remote attackers to cause a denial of service (daemon crash) via unknown vectors that cause an out-of-bounds memory read. • http://www.debian.org/security/2005/dsa-750 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

17 Jan 2003 — dhcpcd DHCP client daemon 1.3.22 and earlier allows local users to execute arbitrary code via shell metacharacters that are fed from a dhcpd .info script into a .exe script. El servicio (demonio) de cliente DHCP dhcpdc 1.3.22 y anteriores permite a usuarios locales ejecutar código arbitrario mediante metacaractéres de shell alimentados desde un script de dhcpd .info en un script .exe. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000549 •