CVE-2019-5747

HIGH

Busybox < 1.30.0 - Out-of-Bounds Read

Title source: rule
STIX 2.1

Description

An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.

References (6)

Core 6
Core References
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://bugs.busybox.net/show_bug.cgi?id=11506
Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3935-1/
Mailing List, Third Party Advisory mailing-list x_refsource_fulldisc
http://seclists.org/fulldisclosure/2019/Sep/7
Mailing List, Third Party Advisory mailing-list x_refsource_bugtraq
https://seclists.org/bugtraq/2019/Sep/7

Scores

CVSS v3 7.5
EPSS 0.0036
EPSS Percentile 58.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-125
Status published
Products (5)
busybox/busybox < 1.30.0
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 18.10
Published Jan 09, 2019
Tracked Since Feb 18, 2026