Description
Stack-based buffer overflow in the script_write_params method in client/dhclient.c in ISC DHCP dhclient 4.1 before 4.1.0p1, 4.0 before 4.0.1p1, 3.1 before 3.1.2p1, 3.0, and 2.0 allows remote DHCP servers to execute arbitrary code via a crafted subnet-mask option.
Published: 2009-07-14
Score: 10.0 Critical
EPSS: 28.1% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1833-1 New dhcp3 packages fix arbitrary code execution
Debian DSA Debian DSA DSA-1833-2 New dhcp3 packages fix arbitrary code execution
Ubuntu USN Ubuntu USN USN-803-1 dhcp vulnerability
Ubuntu USN Ubuntu USN USN-803-2 Dhcp vulnerability
References
Link Providers
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-010.txt.asc cve-icon cve-icon
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083 cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00003.html cve-icon cve-icon
http://secunia.com/advisories/35785 cve-icon cve-icon
http://secunia.com/advisories/35829 cve-icon cve-icon
http://secunia.com/advisories/35830 cve-icon cve-icon
http://secunia.com/advisories/35831 cve-icon cve-icon
http://secunia.com/advisories/35832 cve-icon cve-icon
http://secunia.com/advisories/35841 cve-icon cve-icon
http://secunia.com/advisories/35849 cve-icon cve-icon
http://secunia.com/advisories/35850 cve-icon cve-icon
http://secunia.com/advisories/35851 cve-icon cve-icon
http://secunia.com/advisories/35880 cve-icon cve-icon
http://secunia.com/advisories/36457 cve-icon cve-icon
http://secunia.com/advisories/37342 cve-icon cve-icon
http://secunia.com/advisories/40551 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200907-12.xml cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561471 cve-icon cve-icon
http://www.debian.org/security/2009/dsa-1833 cve-icon cve-icon
http://www.kb.cert.org/vuls/id/410676 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2009:151 cve-icon cve-icon
http://www.osvdb.org/55819 cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2009-1136.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2009-1154.html cve-icon cve-icon
http://www.securityfocus.com/bid/35668 cve-icon cve-icon
http://www.securitytracker.com/id?1022548 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-803-1 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/1891 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/1796 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=507717 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2009-0692 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10758 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5941 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2009-0692 cve-icon
https://www.isc.org/downloadables/12 cve-icon cve-icon
https://www.isc.org/node/468 cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01177.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00340.html cve-icon cve-icon
History

No history.

Subscriptions

Isc Dhcp
Redhat Enterprise Linux Rhel Eus
cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2024-08-07T04:48:51.347Z

Reserved: 2009-02-22T00:00:00.000Z

Link: CVE-2009-0692

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2009-07-14T20:30:00.217

Modified: 2026-04-23T00:35:47.467

Link: CVE-2009-0692

cve-icon Redhat

Severity : Critical

Publid Date: 2009-07-14T00:00:00Z

Links: CVE-2009-0692 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses