Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T15:31:57.167Z
Reserved: 2007-10-10T00:00:00
Link: CVE-2007-5365

No data.

Status : Modified
Published: 2007-10-11T10:17:00.000
Modified: 2024-11-21T00:37:43.840
Link: CVE-2007-5365
