Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-1930

Опубликовано: 14 нояб. 2019
Источник: debian
EPSS Средний

Описание

In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
klibcfixed1.5.22-1package
klibcfixed1.5.20-1+squeeze1squeezepackage
klibcfixed1.5.12-2lenny1lennypackage

EPSS

Процентиль: 96%
0.28991
Средний

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 6 лет назад

In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.

CVSS3: 9.8
nvd
около 6 лет назад

In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.

CVSS3: 9.8
github
больше 3 лет назад

In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.

EPSS

Процентиль: 96%
0.28991
Средний