
CVE-2014-7912 – (Mobile Pwn2Own) Google Android DHCP Parsing Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2014-7912
12 Mar 2015 — The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a large length value of an option in a DHCPACK message. Vulnerabilidad en la función get_option en dhcp.c en las versiones de dhcpcd anteriores a la 6.2.0, usado en dhcpcd 5.x, en Android en versio... • http://www.securitytracker.com/id/1033124 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2014-6060 – Gentoo Linux Security Advisory 201409-03
https://notcve.org/view.php?id=CVE-2014-6060
03 Sep 2014 — The get_option function in dhcpcd 4.0.0 through 6.x before 6.4.3 allows remote DHCP servers to cause a denial of service by resetting the DHO_OPTIONSOVERLOADED option in the (1) bootfile or (2) servername section, which triggers the option to be processed again. La función get_option en dhcpcd 4.0.0 hasta 6.x anterior a 6.4.3 permite a servidores DHCP remotos causar una denegación de servicio mediante la restablecimiento de la opción DHO_OPTIONSOVERLOADED en la sección (1) bootfile o (2) servername, lo que ... • http://advisories.mageia.org/MGASA-2014-0334.html • CWE-399: Resource Management Errors •

CVE-2012-2152 – Debian Security Advisory 2498-1
https://notcve.org/view.php?id=CVE-2012-2152
25 Jun 2012 — Stack-based buffer overflow in the get_packet method in socket.c in dhcpcd 3.2.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long packet. Desbordamiento de búfer basado en pila en el método de get_packet socket.c en dhcpcd v3.2.3 permite a atacantes remotos causar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de un paquete de gran longitud. It was discovered that dhcpcd, a DHCP client, was vulnerable to a stac... • http://www.debian.org/security/2012/dsa-2498 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2011-0996 – Gentoo Linux Security Advisory 201301-04
https://notcve.org/view.php?id=CVE-2011-0996
13 Apr 2011 — dhcpcd before 5.2.12 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message. dhcpcd antes de v5.2.12 permite a atacantes remotos ejecutar comandos de su elección vía metacaracteres encubiertos en un nombre de host obtenido a partir de un mensaje DHCP. A vulnerability has been found in dhcpcd, allowing remote attackers to execute arbitrary code on the DHCP client. Versions less than 5.2.12 are affected. • http://roy.marples.name/archives/dhcpcd-discuss/2011/0326.html • CWE-20: Improper Input Validation •

CVE-2005-1848 – Gentoo Linux Security Advisory 200507-16
https://notcve.org/view.php?id=CVE-2005-1848
11 Jul 2005 — The dhcpcd DHCP client before 1.3.22 allows remote attackers to cause a denial of service (daemon crash) via unknown vectors that cause an out-of-bounds memory read. infamous42md discovered that dhcpcd, a DHCP client for automatically configuring IPv4 networking, can be tricked into reading past the end of the supplied DHCP buffer which could lead to the daemon crashing. • http://www.debian.org/security/2005/dsa-750 •

CVE-2002-1403
https://notcve.org/view.php?id=CVE-2002-1403
17 Jan 2003 — dhcpcd DHCP client daemon 1.3.22 and earlier allows local users to execute arbitrary code via shell metacharacters that are fed from a dhcpd .info script into a .exe script. El servicio (demonio) de cliente DHCP dhcpdc 1.3.22 y anteriores permite a usuarios locales ejecutar código arbitrario mediante metacaractéres de shell alimentados desde un script de dhcpd .info en un script .exe. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000549 •