CVE-2018-20679

HIGH

Busybox < 1.30.0 - Out-of-Bounds Read

Title source: rule
STIX 2.1

Description

An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.

References (7)

Core 7
Core References
Mailing List mailing-list x_refsource_fulldisc
http://seclists.org/fulldisclosure/2019/Sep/7
Mailing List mailing-list x_refsource_bugtraq
https://seclists.org/bugtraq/2019/Sep/7
Release Notes, Third Party Advisory x_refsource_misc
https://busybox.net/news.html
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://bugs.busybox.net/show_bug.cgi?id=11506
Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3935-1/

Scores

CVSS v3 7.5
EPSS 0.1181
EPSS Percentile 93.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-125
Status published
Products (5)
busybox/busybox < 1.30.0
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 18.10
Published Jan 09, 2019
Tracked Since Feb 18, 2026