Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2007-10-11 10:17
Updated : 2024-02-28 11:01
NVD link : CVE-2007-5365
Mitre link : CVE-2007-5365
CVE.ORG link : CVE-2007-5365
JSON object : View
Products Affected
openbsd
- openbsd
redhat
- enterprise_linux
- linux_advanced_workstation
sun
- opensolaris
- solaris
ubuntu
- ubuntu_linux
debian
- debian_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer