7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.933 High
EPSS
Percentile
99.0%
Stack-based buffer overflow in the cons_options function in options.c in
dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations
based on ISC dhcp-2, allows remote attackers to execute arbitrary code or
cause a denial of service (daemon crash) via a DHCP request specifying a
maximum message size smaller than the minimum IP MTU.
Author | Note |
---|---|
kees | original Debian fix was incomplete, see https://bugzilla.redhat.com/show_bug.cgi?id=327781#c5 |