In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/cve-2011-1930 | Not Applicable Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2011-1930 | Third Party Advisory |
http://security.gentoo.org/glsa/glsa-201309-21.xml | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2012/05/22/12 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/47924 | Third Party Advisory VDB Entry |
Information
Published : 2019-11-13 19:15
Updated : 2020-08-18 08:05
NVD link : CVE-2011-1930
Mitre link : CVE-2011-1930
JSON object : View
CWE
Products Affected
debian
- debian_linux
klibc_project
- klibc