barebox prior to version 2026.04.0 contains an out-of-bounds read vulnerability in DHCP option parsing within the dhcp_message_type() function that fails to verify the options pointer remains within received packet bounds. An attacker on the same broadcast domain can send a crafted DHCP Offer or ACK packet without a proper 0xff end marker to cause the parser to read past valid packet data and potentially crash the system.
Metrics
Affected Vendors & Products
References
History
Tue, 12 May 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Barebox
Barebox barebox |
|
| Vendors & Products |
Barebox
Barebox barebox |
Mon, 11 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | barebox prior to version 2026.04.0 contains an out-of-bounds read vulnerability in DHCP option parsing within the dhcp_message_type() function that fails to verify the options pointer remains within received packet bounds. An attacker on the same broadcast domain can send a crafted DHCP Offer or ACK packet without a proper 0xff end marker to cause the parser to read past valid packet data and potentially crash the system. | |
| Title | barebox Out-of-Bounds Read in DHCP Option Parsing | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-11T20:49:01.966Z
Reserved: 2026-03-31T17:58:43.754Z
Link: CVE-2026-34960
No data.
Status : Received
Published: 2026-05-11T22:22:10.847
Modified: 2026-05-11T22:22:10.847
Link: CVE-2026-34960
No data.
OpenCVE Enrichment
Updated: 2026-05-11T23:45:02Z