First published: Thu Jul 30 2015(Updated: )
The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a large length value of an option in a DHCPACK message.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dhcpcd Project Dhcpcd | <=6.1.0 | |
Google Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.