In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.
References
Link | Resource |
---|---|
http://security.gentoo.org/glsa/glsa-201309-21.xml | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2012/05/22/12 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/47924 | Third Party Advisory VDB Entry |
https://access.redhat.com/security/cve/cve-2011-1930 | Not Applicable Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2011-1930 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2019-11-14 03:15
Updated : 2020-08-18 15:05
NVD link : CVE-2011-1930
Mitre link : CVE-2011-1930
CVE.ORG link : CVE-2011-1930
JSON object : View
Products Affected
debian
- debian_linux
klibc_project
- klibc
CWE