Vulnerability Details : CVE-2009-0692
Stack-based buffer overflow in the script_write_params method in client/dhclient.c in ISC DHCP dhclient 4.1 before 4.1.0p1, 4.0 before 4.0.1p1, 3.1 before 3.1.2p1, 3.0, and 2.0 allows remote DHCP servers to execute arbitrary code via a crafted subnet-mask option.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2009-0692
Probability of exploitation activity in the next 30 days: 7.61%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 93 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-0692
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2009-0692
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2009-0692
-
Red Hat 2009-07-16This issue affected the dhcp packages as shipped with Red Hat Enterprise Linux 3 and 4. Updated packages to correct this issue are available via Red Hat Network: https://rhn.redhat.com/errata/CVE-2009-0692.html This issue did not affect the dhcp packages as shipped with Red Hat Enterprise Linux 5 due to the use of FORTIFY_SOURCE protection mechanism that changes the exploitability of the issue into a controlled application termination.
-
http://www.mandriva.com/security/advisories?name=MDVSA-2009:151
- http://www.debian.org/security/2009/dsa-1833
-
http://www.redhat.com/support/errata/RHSA-2009-1136.html
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5941
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10758
-
http://www.securityfocus.com/bid/35668
- https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01177.html
-
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561471
-
http://www.vupen.com/english/advisories/2010/1796
Webmail | OVH- OVH
- https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00340.html
-
https://bugzilla.redhat.com/show_bug.cgi?id=507717
-
http://www.vupen.com/english/advisories/2009/1891
-
http://security.gentoo.org/glsa/glsa-200907-12.xml
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
-
http://www.kb.cert.org/vuls/id/410676
US Government Resource
-
https://www.isc.org/node/468
Patch;Vendor Advisory
-
http://www.ubuntu.com/usn/usn-803-1
-
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-010.txt.asc
-
http://www.securitytracker.com/id?1022548
-
https://www.isc.org/downloadables/12
- http://www.redhat.com/support/errata/RHSA-2009-1154.html
-
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00003.html
- cpe:2.3:a:isc:dhcp:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:isc:dhcp:4.0:*:*:*:*:*:*:*