First published: Fri May 18 2012(Updated: )
The loopback plug-in in ConnMan before 0.85 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) host name or (2) domain name in a DHCP reply.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ConnMan | <=0.84 | |
ConnMan | =0.1 | |
ConnMan | =0.2 | |
ConnMan | =0.3 | |
ConnMan | =0.4 | |
ConnMan | =0.5 | |
ConnMan | =0.6 | |
ConnMan | =0.7 | |
ConnMan | =0.8 | |
ConnMan | =0.9 | |
ConnMan | =0.10 | |
ConnMan | =0.11 | |
ConnMan | =0.12 | |
ConnMan | =0.13 | |
ConnMan | =0.14 | |
ConnMan | =0.15 | |
ConnMan | =0.16 | |
ConnMan | =0.17 | |
ConnMan | =0.18 | |
ConnMan | =0.19 | |
ConnMan | =0.20 | |
ConnMan | =0.21 | |
ConnMan | =0.22 | |
ConnMan | =0.23 | |
ConnMan | =0.24 | |
ConnMan | =0.25 | |
ConnMan | =0.26 | |
ConnMan | =0.27 | |
ConnMan | =0.28 | |
ConnMan | =0.29 | |
ConnMan | =0.30 | |
ConnMan | =0.31 | |
ConnMan | =0.32 | |
ConnMan | =0.33 | |
ConnMan | =0.34 | |
ConnMan | =0.35 | |
ConnMan | =0.36 | |
ConnMan | =0.37 | |
ConnMan | =0.38 | |
ConnMan | =0.39 | |
ConnMan | =0.40 | |
ConnMan | =0.41 | |
ConnMan | =0.42 | |
ConnMan | =0.43 | |
ConnMan | =0.44 | |
ConnMan | =0.45 | |
ConnMan | =0.46 | |
ConnMan | =0.47 | |
ConnMan | =0.48 | |
ConnMan | =0.49 | |
ConnMan | =0.50 | |
ConnMan | =0.51 | |
ConnMan | =0.52 | |
ConnMan | =0.53 | |
ConnMan | =0.54 | |
ConnMan | =0.55 | |
ConnMan | =0.56 | |
ConnMan | =0.57 | |
ConnMan | =0.58 | |
ConnMan | =0.59 | |
ConnMan | =0.60 | |
ConnMan | =0.61 | |
ConnMan | =0.62 | |
ConnMan | =0.63 | |
ConnMan | =0.64 | |
ConnMan | =0.65 | |
ConnMan | =0.66 | |
ConnMan | =0.67 | |
ConnMan | =0.68 | |
ConnMan | =0.69 | |
ConnMan | =0.70 | |
ConnMan | =0.71 | |
ConnMan | =0.72 | |
ConnMan | =0.73 | |
ConnMan | =0.74 | |
ConnMan | =0.75 | |
ConnMan | =0.76 | |
ConnMan | =0.77 | |
ConnMan | =0.78 | |
ConnMan | =0.79 | |
ConnMan | =0.80 | |
ConnMan | =0.81 | |
ConnMan | =0.82 | |
ConnMan | =0.83 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2321 has a medium severity level, allowing remote attackers to execute arbitrary commands.
To fix CVE-2012-2321, update ConnMan to version 0.85 or later.
ConnMan versions prior to 0.85, including all versions from 0.1 to 0.84, are affected by CVE-2012-2321.
CVE-2012-2321 can be exploited using shell metacharacters in DHCP replies to execute arbitrary commands on the system.
Yes, CVE-2012-2321 is considered to be relatively easy to exploit given its reliance on DHCP interactions.