Lucene search

K
osvGoogleOSV:DLA-506-1
HistoryJun 06, 2016 - 12:00 a.m.

dhcpcd5 - security update

2016-06-0600:00:00
Google
osv.dev
7

0.012 Low

EPSS

Percentile

85.4%

Two vulnerabilities were discovered in dhcpcd5 a DHCP client package.
A remote (on a local network) attacker can possibly execute arbitrary
code or cause a denial of service attack by crafted messages.

  • CVE-2014-7912
    The get_option function does not validate the relationship between
    length fields and the amount of data, which allows remote DHCP
    servers to execute arbitrary code or cause a denial of service
    (memory corruption) via a large length value of an option in a
    DHCPACK message.
  • CVE-2014-7913
    The print_option function misinterprets the return value of the
    snprintf function, which allows remote DHCP servers to execute
    arbitrary code or cause a denial of service (memory corruption)
    via a crafted message.

For Debian 7 Wheezy, these problems have been fixed in version
5.5.6-1+deb7u2.

We recommend that you upgrade your dhcpcd5 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <https://wiki.debian.org/LTS&gt;

CPENameOperatorVersion
dhcpcd5eq5.5.6-1
dhcpcd5eq5.5.6-1+deb7u1