Vulnerability identifier: #VU16958
Vulnerability risk: Low
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID:
CWE-ID:
CWE-125
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
BusyBox
Universal components / Libraries /
Software for developers
Vendor: busybox.net
Description
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in udhcp components (consumed by the DHCP server, client, and relay). A remote attacker can leak sensitive information from the stack by sending a crafted DHCP message.
Mitigation
Update to version 1.30.0.
Vulnerable software versions
BusyBox: 1.28.0 - 1.29.3
External links
https://bugs.busybox.net/show_bug.cgi?id=11506
https://busybox.net/news.html
https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.