Bugzilla – Bug 894580
VUL-0: CVE-2014-6060: dhcpcd: DoS attack via DHO_OPTIONSOVERLOADED
Last modified: 2014-09-02 09:13:17 UTC
via oss-sec From: Roy Marples <roy@marples.name> Subject: [oss-security] CVE Request: dhcpcd DoS attack Hi dhcpcd-4.0.0 though to dhcpcd.6.4.2 are vulnerable to a DoS attack. As reported by Tobias Stoeckmann: In function get_option, the DHO_OPTIONSOVERLOADED option checks if there are overloaded options, like bootfile or servername. It tries to make sure that it's called only once, BUT overwrites that information after receiving a DHO_END. A malicious server could set the option DHO_OPTIONSOVERLOADED yet another time in the bootfile or servername section, which will result in another jump -- maybe into the same area. This has been fixed upstream here: http://roy.marples.name/projects/dhcpcd/ci/1d2b93aa5ce25a8a710082fe2d36a6bf7f5794d5?sbs=0 I would like to request a CVE for the issue. dhcpcd-6.4.3 has been released with the above fix. Thanks Roy
I think this is the same dhcpcd that we have, but we did the last upgrade to 3.2.3 on May 14 2008(!)
does not affect our code.