Vulnerability Details : CVE-2014-7912
The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a large length value of an option in a DHCPACK message.
Vulnerability category: Memory CorruptionExecute codeDenial of service
Products affected by CVE-2014-7912
- cpe:2.3:a:dhcpcd_project:dhcpcd:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-7912
0.53%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 64 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-7912
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2014-7912
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-7912
-
https://android.googlesource.com/platform/external/dhcpcd/+/73c09dd8067250734511d955d8f792b41c7213f0
73c09dd8067250734511d955d8f792b41c7213f0 - platform/external/dhcpcd - Git at Google
-
http://www.zerodayinitiative.com/advisories/ZDI-15-093/
ZDI-15-093 | Zero Day Initiative
-
http://www.securitytracker.com/id/1033124
Google Android Buffer Overflows in DHCP Let Remote Users Execute Arbitrary Code - SecurityTracker
Jump to