Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2011-1930

Опубликовано: 14 нояб. 2019
Источник: nvd
CVSS3: 9.8
CVSS2: 10
EPSS Средний

Описание

In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:klibc_project:klibc:*:*:*:*:*:*:*:*
Версия до 1.5.25 (исключая)
Конфигурация 2

Одно из

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

EPSS

Процентиль: 96%
0.28991
Средний

9.8 Critical

CVSS3

10 Critical

CVSS2

Дефекты

NVD-CWE-Other

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 6 лет назад

In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.

CVSS3: 9.8
debian
около 6 лет назад

In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /t ...

CVSS3: 9.8
github
больше 3 лет назад

In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.

EPSS

Процентиль: 96%
0.28991
Средний

9.8 Critical

CVSS3

10 Critical

CVSS2

Дефекты

NVD-CWE-Other