{ "schema_version": "1.4.0", "id": "GHSA-x566-m9mc-f47w", "modified": "2022-05-24T17:45:30Z", "published": "2022-05-24T17:45:30Z", "aliases": [ "CVE-2020-7461" ], "details": "In FreeBSD 12.1-STABLE before r365010, 11.4-STABLE before r365011, 12.1-RELEASE before p9, 11.4-RELEASE before p3, and 11.3-RELEASE before p13, dhclient(8) fails to handle certain malformed input related to handling of DHCP option 119 resulting a heap overflow. The heap overflow could in principle be exploited to achieve remote code execution. The affected process runs with reduced privileges in a Capsicum sandbox, limiting the immediate impact of an exploit.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7461" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-288459.pdf" }, { "type": "WEB", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:26.dhclient.asc" } ], "database_specific": { "cwe_ids": [ "CWE-787" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-03-26T21:15:00Z" } }