In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Klibc | Klibc_project | * | 1.5.25 (excluding) |
Klibc | Ubuntu | hardy | * |
Klibc | Ubuntu | lucid | * |
Klibc | Ubuntu | maverick | * |
Klibc | Ubuntu | natty | * |
Klibc | Ubuntu | upstream | * |