Advisory Details

March 12th, 2015

(Mobile Pwn2Own) Google Android DHCP Parsing Remote Code Execution Vulnerability

ZDI-15-093
ZDI-CAN-2620

CVE ID CVE-2014-7912
CVSS SCORE 5.1, AV:N/AC:H/Au:N/C:P/I:P/A:P
AFFECTED VENDORS Google
AFFECTED PRODUCTS Android
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['17039']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Google Android. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the parsing of the DHCP options in a DHCP ACK packet. The vulnerability is triggered when the LENGTH of an option, when added to the current read position, exceeds the actual length of the DHCP options buffer. An attacker can leverage this vulnerability to execute code on the device.

ADDITIONAL DETAILS Google has issued an update to correct this vulnerability. More details can be found at:
https://android.googlesource.com/platform/external/dhcpcd/+/73c09dd8067250734511d955d8f792b41c7213f0
DISCLOSURE TIMELINE
  • 2014-11-13 - Vulnerability reported to vendor
  • 2015-03-12 - Coordinated public release of advisory
CREDIT Jüri Aedla
BACK TO ADVISORIES