In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.
                
            References
                    | Link | Resource | 
|---|---|
| https://access.redhat.com/security/cve/cve-2011-1930 | Not Applicable Third Party Advisory | 
| https://security-tracker.debian.org/tracker/CVE-2011-1930 | Third Party Advisory | 
| http://security.gentoo.org/glsa/glsa-201309-21.xml | Third Party Advisory | 
| http://www.openwall.com/lists/oss-security/2012/05/22/12 | Mailing List Third Party Advisory | 
| http://www.securityfocus.com/bid/47924 | Third Party Advisory VDB Entry | 
Information
                Published : 2019-11-13 19:15
Updated : 2020-08-18 08:05
NVD link : CVE-2011-1930
Mitre link : CVE-2011-1930
JSON object : View
CWE
                Products Affected
                debian
- debian_linux
 
klibc_project
- klibc
 


