Bug 1666667 (CVE-2018-20679) - CVE-2018-20679 busybox: Out of bounds read in udhcp components resulting in information disclosure
Summary: CVE-2018-20679 busybox: Out of bounds read in udhcp components resulting in i...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2018-20679
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1666668
Blocks: 1666670
TreeView+ depends on / blocked
 
Reported: 2019-01-16 10:30 UTC by Andrej Nemec
Modified: 2021-02-16 22:32 UTC (History)
3 users (show)

Fixed In Version: busybox 1.30.0
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-01-22 14:10:53 UTC
Embargoed:


Attachments (Terms of Use)

Description Andrej Nemec 2019-01-16 10:30:31 UTC
An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.

Upstream issue:

https://bugs.busybox.net/show_bug.cgi?id=11506

Upstream patch:

https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c

Comment 1 Andrej Nemec 2019-01-16 10:31:19 UTC
Created busybox tracking bugs for this issue:

Affects: fedora-all [bug 1666668]

Comment 2 Stefan Cornelius 2019-01-22 14:09:26 UTC
Statement:

This issue did not affect the versions of busybox as shipped with Red Hat Enterprise Linux 5 and 6.


Note You need to log in before you can comment on or make changes to this bug.