In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Klibc | Klibc_project | * | 1.5.25 (excluding) |
| Klibc | Ubuntu | hardy | * |
| Klibc | Ubuntu | lucid | * |
| Klibc | Ubuntu | maverick | * |
| Klibc | Ubuntu | natty | * |
| Klibc | Ubuntu | upstream | * |