← Voltar para CVEs
CVE-2016-2148
CRITICAL9.8
Descricao
Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
Detalhes CVE
Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado2/9/2017
Ultima modificacao4/20/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
busybox:busyboxcanonical:ubuntu_linuxdebian:debian_linux
Fraquezas (CWE)
CWE-119
Referencias
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html(secalert@redhat.com)
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html(secalert@redhat.com)
http://seclists.org/fulldisclosure/2019/Jun/18(secalert@redhat.com)
http://seclists.org/fulldisclosure/2019/Sep/7(secalert@redhat.com)
http://seclists.org/fulldisclosure/2020/Aug/20(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2016/03/11/16(secalert@redhat.com)
https://busybox.net/news.html(secalert@redhat.com)
https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html(secalert@redhat.com)
https://seclists.org/bugtraq/2019/Jun/14(secalert@redhat.com)
https://seclists.org/bugtraq/2019/Sep/7(secalert@redhat.com)
https://security.gentoo.org/glsa/201612-04(secalert@redhat.com)
https://usn.ubuntu.com/3935-1/(secalert@redhat.com)
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2019/Jun/18(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2019/Sep/7(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2020/Aug/20(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2016/03/11/16(af854a3a-2127-422b-91ae-364da2661108)
https://busybox.net/news.html(af854a3a-2127-422b-91ae-364da2661108)
https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Jun/14(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Sep/7(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201612-04(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3935-1/(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.