[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2007-5365Date: (C)2007-10-11   (M)2023-12-22


Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.2
Exploit Score: 3.9
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1018794
SECTRACK-1021157
http://www.securityfocus.com/archive/1/482085/100/100/threaded
http://www.securityfocus.com/archive/1/483230/100/100/threaded
SUNALERT-243806
BID-25984
SECUNIA-27160
SECUNIA-27273
SECUNIA-27338
SECUNIA-27350
BID-32213
SECUNIA-32668
EXPLOIT-DB-4601
ADV-2008-3088
DSA-1388
RHSA-2007:0970
USN-531-1
USN-531-2
http://www.openbsd.org/errata40.html#016_dhcpd
http://www.openbsd.org/errata41.html#010_dhcpd
http://www.openbsd.org/errata42.html#001_dhcpd
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354
http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1
http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.c
openbsd-dhcp-bo(37045)
oval:org.mitre.oval:def:5817

CPE    8
cpe:/o:openbsd:openbsd:4.1
cpe:/o:openbsd:openbsd:4.0
cpe:/o:openbsd:openbsd:4.2
cpe:/o:debian:debian_linux:4.0
...
CWE    1
CWE-119

© SecPod Technologies