#VU12743 Command injection in DHCP


Published: 2020-03-18 | Updated: 2021-06-17

Vulnerability identifier: #VU12743

Vulnerability risk: Low

CVSSv3.1: 6.3 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C]

CVE-ID: CVE-2018-1111

CWE-ID: CWE-77

Exploitation vector: Local

Exploit availability: Yes

Vulnerable software:
DHCP
Server applications / Other server solutions

Vendor: ISC

Description
The vulnerability allows a physical attacker to execute arbitrary commands with elevated privileges on the target system.

The weakness exists in the NetworkManager integration script due to command injection. A physical attacker can return specially crafted data via dhcp and execute arbitrary commands with root privileges.

Mitigation
Install update from vendor's website.

Vulnerable software versions

DHCP:


External links
http://access.redhat.com/security/vulnerabilities/3442151


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.


Latest bulletins with this vulnerability