{"id":"CVE-2018-20679","details":"An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.","modified":"2026-05-18T05:51:39.433081147Z","published":"2019-01-09T16:29:00.273Z","related":["SUSE-SU-2021:3531-1","SUSE-SU-2022:0135-1","SUSE-SU-2022:0135-2","SUSE-SU-2022:3959-1","SUSE-SU-2022:4253-1","openSUSE-SU-2021:1408-1","openSUSE-SU-2021:3531-1","openSUSE-SU-2022:0135-1","openSUSE-SU-2024:11738-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"14.04"},{"last_affected":"16.04"},{"last_affected":"18.04"},{"last_affected":"18.10"}],"vendor_product":"canonical:ubuntu_linux","source":"CPE_FIELD","cpes":["cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"]}]},"references":[{"type":"WEB","url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"},{"type":"WEB","url":"http://seclists.org/fulldisclosure/2019/Sep/7"},{"type":"WEB","url":"https://seclists.org/bugtraq/2019/Sep/7"},{"type":"ADVISORY","url":"https://busybox.net/news.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3935-1/"},{"type":"REPORT","url":"https://bugs.busybox.net/show_bug.cgi?id=11506"},{"type":"FIX","url":"https://git.busybox.net/busybox/commit/?id=6d3b4bb24da9a07c263f3c1acf8df85382ff562c"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mirror/busybox","events":[{"introduced":"0"},{"fixed":"ef800e5441185585986f9b7aaf39010a926fbd5f"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"1.30.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*"}}],"versions":["1_29_0","1_28_0","1_27_0","1_26_0","1_25_0","1_24_0","1_23_0","1_22_0","1_21_0","1_20_0","1_19_0","1_18_0","1_17_0","1_16_0","1_15_0","1_14_0","1_12_0","1_10_0","1_9_0","1_8_0","1_4_0","1_2_0","1_1_1","1_1_0","1_00","1_00_rc3","1_00_rc2","1_00_rc1","1_00_pre10","1_00_pre9","1_00_pre8","1_00_pre7","1_00_pre6","1_00_pre5","1_00_pre4","1_00_pre3","1_00_pre2","1_00_pre1","0_60_5","0_60_4","0_60_3","0_60_2","0_60_1","0_60_0","0_52","0_51","0_50","0_49","0_48","0_47","0_46","0_45","0_43","0_43pre1","0_42","0_41","0_40","0_39","0_36","0_34","0_33","0_32","0_29alpha2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-20679.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}