10
CVSSv2

CVE-2011-1930

Published: 14/11/2019 Updated: 18/08/2020
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote malicious user to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

klibc project klibc

debian debian linux 8.0

debian debian linux 9.0

debian debian linux 10.0

Exploits

source: wwwsecurityfocuscom/bid/47924/info klibc is prone to a shell-command-execution vulnerability because the application fails to properly sanitize user-supplied input An attacker can exploit this issue to execute arbitrary shell commands in the context of the application that uses the vulnerable library Versions prior to klibc 1 ...