In FreeBSD 12.1-STABLE before r365010, 11.4-STABLE before r365011, 12.1-RELEASE before p9, 11.4-RELEASE before p3, and 11.3-RELEASE before p13, dhclient(8) fails to handle certain malformed input related to handling of DHCP option 119 resulting a heap overflow. The heap overflow could in principle be exploited to achieve remote code execution. The affected process runs with reduced privileges in a Capsicum sandbox, limiting the immediate impact of an exploit.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:26.dhclient.asc | vendor advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-288459.pdf | third party advisory |