Bug 963549 (CVE-2016-1504) - VUL-0: CVE-2016-1504: dhcpcd: invalid read/crash via malformed dhcp responses
Summary: VUL-0: CVE-2016-1504: dhcpcd: invalid read/crash via malformed dhcp responses
Status: RESOLVED INVALID
Alias: CVE-2016-1504
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Major
Target Milestone: ---
Assignee: Peter Varkoly
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/160418/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2016-01-26 09:22 UTC by Marcus Meissner
Modified: 2016-01-26 09:28 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2016-01-26 09:22:49 UTC
CVE-2016-1504

via oss-sec

http://roy.marples.name/projects/dhcpcd/info/595883e2a431f65d8fabf33059aa4689cca17403


    Ensure that option length fits inside data length less option size.
    Thanks to Nico Golde for the report.

        can lead to an invalid read/crash via malformed dhcp responses


References:
http://seclists.org/oss-sec/2016/q1/38
http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1504.html
Comment 1 Marcus Meissner 2016-01-26 09:28:24 UTC
The code in our dhcpcd versions (up to 3.2.3) is different from the above fixed code.

The option parser is entirely different (and probably was rewritten later).

What I looked at does not exhibit the problems.