Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20140901214340.A7848332024@smtpvbsrv1.mitre.org>
Date: Mon,  1 Sep 2014 17:43:40 -0400 (EDT)
From: cve-assign@...re.org
To: roy@...ples.name
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: dhcpcd DoS attack

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> http://roy.marples.name/projects/dhcpcd/ci/1d2b93aa5ce25a8a710082fe2d36a6bf7f5794d5?sbs=0

> In function get_option, the DHO_OPTIONSOVERLOADED option checks if there
> are overloaded options, like bootfile or servername.  It tries to make
> sure that it's called only once, BUT overwrites that information after
> receiving a DHO_END.  A malicious server could set the option
> DHO_OPTIONSOVERLOADED yet another time in the bootfile or servername
> section, which will result in another jump -- maybe into the same area.

> dhcpcd-4.0.0 though to dhcpcd.6.4.2 are vulnerable

> dhcpcd-6.4.3 has been released with the above fix.

Use CVE-2014-6060. Presumably this crosses privilege boundaries. (The
type of DoS impact is not stated, and the server is implicitly allowed
to conduct some types of DoS attacks against the client -- for
example, by refusing to allocate an IP address.)

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUBOgTAAoJEKllVAevmvmswEUIAMkBxocvxtTziw5PJQrUr6y9
Im6hdAVOVs8PSNHMvrUPqlB1xer5CNj+GvZ1eSyuavzikxPfBmekiTn9PMilEXRV
OczR9FyjZnTgRD1CtBzaMO8KQ7V3ojiF3NSQyQV+cBZVyLpxvPeXDq8Uw9qIwmMJ
eyM8LpmY1XCQ1/vXu8lsDYOeKp3JRvZmjVXfwpXWmLVuVnsfoTGp0Sln+B3VbCQg
jMbeiEkaScXCbh4zKVtFYwR8a3mDhOiD0sSVQdl7jE/wZP+7K8QodGLJTp7KjTOO
AoLUshwGfK0ACyWbEiG4MdW8ouIiLoTxKV1+F3r0McMoMGO3nAkVrNPXDeNXQZM=
=uS8R
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.