[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96078

 
 

909

 
 

78009

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2007-5365

Date: (C)2007-10-11   (M)2017-10-12
 
CVSS Score: 7.2Access Vector: LOCAL
Exploitability Subscore: 3.9Access Complexity: LOW
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.

Reference:
SECTRACK-1018794
SECTRACK-1021157
http://www.securityfocus.com/archive/1/archive/1/482085/100/100/threaded
http://www.securityfocus.com/archive/1/archive/1/482085/100/100/threaded
http://www.securityfocus.com/archive/1/archive/1/483230/100/100/threaded
SUNALERT-243806
BID-25984
SECUNIA-27160
SECUNIA-27273
SECUNIA-27338
SECUNIA-27350
BID-32213
SECUNIA-32668
EXPLOIT-DB-4601
ADV-2008-3088
DSA-1388
RHSA-2007:0970
USN-531-1
USN-531-2
http://www.openbsd.org/errata40.html#016_dhcpd
http://www.openbsd.org/errata41.html#010_dhcpd
http://www.openbsd.org/errata42.html#001_dhcpd
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354
http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1
http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.c
openbsd-dhcp-bo(37045)

CPE    7
cpe:/o:openbsd:openbsd:4.1
cpe:/o:openbsd:openbsd:4.0
cpe:/o:openbsd:openbsd:4.2
cpe:/o:debian:debian_linux:4.0
...
CWE    1
CWE-119

© 2013 SecPod Technologies