CVE-2018-20679

An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 93%
VendorProductVersion
busyboxbusybox
𝑥
< 1.30.0
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
canonicalubuntu_linux
18.10
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
busybox
bullseye
1:1.30.1-6
fixed
stretch
no-dsa
jessie
no-dsa
bookworm
1:1.35.0-4
fixed
sid
1:1.37.0-4
fixed
trixie
1:1.37.0-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
busybox
hirsute
Fixed 1:1.27.2-2ubuntu5
released
groovy
Fixed 1:1.27.2-2ubuntu5
released
focal
Fixed 1:1.27.2-2ubuntu5
released
eoan
Fixed 1:1.27.2-2ubuntu5
released
disco
Fixed 1:1.27.2-2ubuntu5
released
cosmic
Fixed 1:1.27.2-2ubuntu4.1
released
bionic
Fixed 1:1.27.2-2ubuntu3.2
released
xenial
Fixed 1:1.22.0-15ubuntu1.4
released
trusty
Fixed 1:1.21.0-1ubuntu1.4
released