CVE-2019-5747

Publication date 9 January 2019

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

7.5 · High

Score breakdown

An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.

Status

Package Ubuntu Release Status
busybox 21.04 hirsute
Fixed 1:1.27.2-2ubuntu5
20.10 groovy
Fixed 1:1.27.2-2ubuntu5
20.04 LTS focal
Fixed 1:1.27.2-2ubuntu5
19.10 eoan
Fixed 1:1.27.2-2ubuntu5
19.04 disco
Fixed 1:1.27.2-2ubuntu5
18.10 cosmic
Fixed 1:1.27.2-2ubuntu4.1
18.04 LTS bionic
Fixed 1:1.27.2-2ubuntu3.2
16.04 LTS xenial
Fixed 1:1.22.0-15ubuntu1.4
14.04 LTS trusty
Fixed 1:1.21.0-1ubuntu1.4

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
busybox

Severity score breakdown

Parameter Value
Base score 7.5 · High
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

References

Related Ubuntu Security Notices (USN)

Other references