mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
18 lines
1.7 KiB
Markdown
18 lines
1.7 KiB
Markdown
![]() |
### [CVE-2018-5732](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732)
|
||
|

|
||
|

|
||
|
%20should%20make%20it%20difficult%20to%20leverage%20this%20vulnerability%20to%20achieve%20remote%20code%20execution%2C%20but%20we%20cannot%20rule%20it%20out%20as%20impossible.%20The%20safest%20course%20is%20to%20patch%20dhclient%20so%20that%20the%20buffer%20overflow%20cannot%20occur.&color=brighgreen)
|
||
|
|
||
|
### Description
|
||
|
|
||
|
Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
No PoCs from references.
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/fbreton/lacework
|
||
|
|