Lucene search

K
ubuntucveUbuntu.comUB:CVE-2007-5365
HistoryOct 11, 2007 - 12:00 a.m.

CVE-2007-5365

2007-10-1100:00:00
ubuntu.com
ubuntu.com
6

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.933 High

EPSS

Percentile

99.0%

Stack-based buffer overflow in the cons_options function in options.c in
dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations
based on ISC dhcp-2, allows remote attackers to execute arbitrary code or
cause a denial of service (daemon crash) via a DHCP request specifying a
maximum message size smaller than the minimum IP MTU.

Notes

Author Note
kees original Debian fix was incomplete, see https://bugzilla.redhat.com/show_bug.cgi?id=327781#c5
OSVersionArchitecturePackageVersionFilename
ubuntu6.06noarchdhcp<ย 2.0pl5-19.4ubuntu0.2UNKNOWN
ubuntu6.10noarchdhcp<ย 2.0pl5-19.4ubuntu1.2UNKNOWN
ubuntu7.04noarchdhcp<ย 2.0pl5-19.5ubuntu2.2UNKNOWN
ubuntu7.10noarchdhcp<ย 2.0pl5dfsg1-20ubuntu1.2UNKNOWN

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.933 High

EPSS

Percentile

99.0%