Описание
DHCP packages in Red Hat Enterprise Linux 6 and 7, Fedora 28, and earlier are vulnerable to a command injection flaw in the NetworkManager integration script included in the DHCP client. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.
A command injection flaw was found in the NetworkManager integration script included in the DHCP client packages in Red Hat Enterprise Linux. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.
Отчет
Red Hat has been made aware of a vulnerability affecting the DHCP client packages as shipped with Red Hat Enterprise Linux 6 and 7. This vulnerability CVE-2018-1111 was rated as having a security impact of Critical. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.
Red Hat Enterprise Virtualization 4.1 includes the vulnerable components, but the default configuration is not impacted because NetworkManager is turned off in the Management Appliance, and not used in conjunction with DHCP in the Hypervisor. Customers can still obtain the updated packages from Red Hat Enterprise Linux channels using yum update, or upgrade to Red Hat Enterprise Virtualization 4.2, which includes the fixed packages.
Red Hat Enterprise Virtualization 3.6 is not vulnerable as it does not use DHCP.
Меры по смягчению последствий
Please access https://access.redhat.com/security/vulnerabilities/3442151 for information on how to mitigate this issue.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | dhcp | Not affected | ||
| Red Hat Enterprise Linux 8 | dhcp | Not affected | ||
| Red Hat Enterprise Linux 6 | dhcp | Fixed | RHSA-2018:1454 | 15.05.2018 |
| Red Hat Enterprise Linux 6.4 Advanced Update Support | dhcp | Fixed | RHSA-2018:1461 | 15.05.2018 |
| Red Hat Enterprise Linux 6.5 Advanced Update Support | dhcp | Fixed | RHSA-2018:1460 | 15.05.2018 |
| Red Hat Enterprise Linux 6.6 Advanced Update Support | dhcp | Fixed | RHSA-2018:1459 | 15.05.2018 |
| Red Hat Enterprise Linux 6.6 Telco Extended Update Support | dhcp | Fixed | RHSA-2018:1459 | 15.05.2018 |
| Red Hat Enterprise Linux 6.7 Extended Update Support | dhcp | Fixed | RHSA-2018:1458 | 15.05.2018 |
| Red Hat Enterprise Linux 7 | dhcp | Fixed | RHSA-2018:1453 | 15.05.2018 |
| Red Hat Enterprise Linux 7.2 Advanced Update Support | dhcp | Fixed | RHSA-2018:1457 | 15.05.2018 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.5 High
CVSS3
Связанные уязвимости
DHCP packages in Red Hat Enterprise Linux 6 and 7, Fedora 28, and earlier are vulnerable to a command injection flaw in the NetworkManager integration script included in the DHCP client. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.
DHCP packages in Red Hat Enterprise Linux 6 and 7, Fedora 28, and earlier are vulnerable to a command injection flaw in the NetworkManager integration script included in the DHCP client. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.
Уязвимость реализации DHCP-клиента операционных систем Red Hat Enterprise Linux и Fedora, позволяющая нарушителю выполнить произвольные команды с привилегиями root
EPSS
7.5 High
CVSS3