In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote malicious user to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
klibc project klibc |
||
debian debian linux 8.0 |
||
debian debian linux 9.0 |
||
debian debian linux 10.0 |