Description
An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.
References (7)
Core 7
Core References
Mailing List mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2019/Sep/7
Mailing List mailing-list
x_refsource_bugtraq
https://seclists.org/bugtraq/2019/Sep/7
Patch, Third Party Advisory x_refsource_misc
https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c
Release Notes, Third Party Advisory x_refsource_misc
https://busybox.net/news.html
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://bugs.busybox.net/show_bug.cgi?id=11506
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3935-1/
Exploit, Third Party Advisory x_refsource_misc
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
Scores
CVSS v3
7.5
EPSS
0.1181
EPSS Percentile
93.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-125
Status
published
Products (5)
busybox/busybox
< 1.30.0
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
canonical/ubuntu_linux
18.10
Published
Jan 09, 2019
Tracked Since
Feb 18, 2026