CVE-2014-7912

EUVD-2014-7762
The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a large length value of an option in a DHCPACK message.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 66%
Affected Products (NVD)
VendorProductVersion
dhcpcd_projectdhcpcd
𝑥
≤ 6.1.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
dhcpcd5
bookworm
9.4.1-24~deb12u4
fixed
bullseye
7.1.0-2
fixed
jessie
no-dsa
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dhcpcd
artful
dne
bionic
dne
cosmic
dne
disco
dne
focal
dne
jammy
dne
kinetic
dne
lunar
dne
mantic
not-affected
noble
not-affected
precise
ignored
trusty
dne
vivid
ignored
wily
dne
xenial
dne
yakkety
dne
zesty
dne
dhcpcd5
artful
not-affected
bionic
not-affected
cosmic
not-affected
disco
not-affected
focal
not-affected
jammy
not-affected
kinetic
not-affected
lunar
not-affected
mantic
dne
noble
dne
precise
ignored
trusty
needed
vivid
ignored
wily
not-affected
xenial
not-affected
yakkety
not-affected
zesty
not-affected