ALT-PU-2016-1017-1
Closed vulnerabilities
Published: 2016-04-18
BDU:2016-01067
Уязвимость свободной реализации DHCP-клиента dhcpcd, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Severity: CRITICAL (10.0)
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
References:
Published: 2016-04-18
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2016-1503
dhcpcd before 6.10.0, as used in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 and other products, mismanages option lengths, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a malformed DHCP response, aka internal bug 26461634.
Severity: CRITICAL (10.0)
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: CRITICAL (9.8)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References:
- http://roy.marples.name/projects/dhcpcd/info/76a1609352263bd9def1300d7ba990679571fa30
- http://source.android.com/security/bulletin/2016-04-02.html
- http://www.securitytracker.com/id/1034601
- https://android.googlesource.com/platform/external/dhcpcd/+/1390ace71179f04a09c300ee8d0300aa69d9db09
- https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05388711
- https://security.gentoo.org/glsa/201606-07
- http://roy.marples.name/projects/dhcpcd/info/76a1609352263bd9def1300d7ba990679571fa30
- http://source.android.com/security/bulletin/2016-04-02.html
- http://www.securitytracker.com/id/1034601
- https://android.googlesource.com/platform/external/dhcpcd/+/1390ace71179f04a09c300ee8d0300aa69d9db09
- https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05388711
- https://security.gentoo.org/glsa/201606-07
Published: 2017-02-07
Modified: 2025-04-20
Modified: 2025-04-20
CVE-2016-1504
dhcpcd before 6.10.0 allows remote attackers to cause a denial of service (invalid read and crash) via vectors related to the option length.
Severity: MEDIUM (5.0)
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Severity: HIGH (7.5)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References:
- http://roy.marples.name/projects/dhcpcd/info/595883e2a431f65d8fabf33059aa4689cca17403
- http://roy.marples.name/projects/dhcpcd/timeline?r=trunk&nd&c=2016-01-07+16%3A47%3A19&n=200
- http://www.openwall.com/lists/oss-security/2016/01/07/3
- http://www.openwall.com/lists/oss-security/2016/01/07/4
- http://www.securitytracker.com/id/1034601
- https://security.gentoo.org/glsa/201606-07
- http://roy.marples.name/projects/dhcpcd/info/595883e2a431f65d8fabf33059aa4689cca17403
- http://roy.marples.name/projects/dhcpcd/timeline?r=trunk&nd&c=2016-01-07+16%3A47%3A19&n=200
- http://www.openwall.com/lists/oss-security/2016/01/07/3
- http://www.openwall.com/lists/oss-security/2016/01/07/4
- http://www.securitytracker.com/id/1034601
- https://security.gentoo.org/glsa/201606-07