First published: Thu Nov 14 2019(Updated: )
In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Klibc Project Klibc | <1.5.25 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/klibc | 2.0.8-6.1 2.0.12-1 2.0.13-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.