Total vulnerabilities in the database
dhcpcd before 6.10.0, as used in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 and other products, mismanages option lengths, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a malformed DHCP response, aka internal bug 26461634.
Software | From | Fixed in |
---|---|---|
dhcpcd_project / dhcpcd | - | 6.9.4.x |
google / android | 5.1.0 | 5.1.0.x |
google / android | 4.2 | 4.2.x |
google / android | 4.1 | 4.1.x |
google / android | 6.0.1 | 6.0.1.x |
google / android | 6.0 | 6.0.x |
google / android | 4.0.2 | 4.0.2.x |
google / android | 4.4.3 | 4.4.3.x |
google / android | 4.0.4 | 4.0.4.x |
google / android | 4.3 | 4.3.x |
google / android | 4.0.1 | 4.0.1.x |
google / android | 4.2.1 | 4.2.1.x |
google / android | 5.0.1 | 5.0.1.x |
google / android | 5.0 | 5.0.x |
google / android | 4.0.3 | 4.0.3.x |
google / android | 4.0 | 4.0.x |
google / android | 4.4 | 4.4.x |
google / android | 4.4.1 | 4.4.1.x |
google / android | 4.2.2 | 4.2.2.x |
google / android | 4.3.1 | 4.3.1.x |
google / android | 4.4.2 | 4.4.2.x |
google / android | 5.1 | 5.1.x |
google / android | 4.1.2 | 4.1.2.x |