CVE-2011-0997 : Detail

CVE-2011-0997

A03-Injection
81.4%V4
Network
2011-04-08
13h00 +00:00
2017-09-18
10h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 37623

Publication date : 2015-07-15 22h00 +00:00
Author : Pierre Kim
EDB Verified : No

Products Mentioned

Configuraton 0

Isc>>Dhcp >> Version 3.0

Isc>>Dhcp >> Version 3.0.1

Isc>>Dhcp >> Version 3.0.1

Isc>>Dhcp >> Version 3.0.1

Isc>>Dhcp >> Version 3.0.1

Isc>>Dhcp >> Version 3.0.1

Isc>>Dhcp >> Version 3.0.1

Isc>>Dhcp >> Version 3.0.1

Isc>>Dhcp >> Version 3.0.1

Isc>>Dhcp >> Version 3.0.1

Isc>>Dhcp >> Version 3.0.1

Isc>>Dhcp >> Version 3.0.1

Isc>>Dhcp >> Version 3.0.1

Isc>>Dhcp >> Version 3.0.1

Isc>>Dhcp >> Version 3.0.2

Isc>>Dhcp >> Version 3.0.2

Isc>>Dhcp >> Version 3.0.2

Isc>>Dhcp >> Version 3.0.2

Isc>>Dhcp >> Version 3.0.2

Isc>>Dhcp >> Version 3.0.3

Isc>>Dhcp >> Version 3.0.3

Isc>>Dhcp >> Version 3.0.3

Isc>>Dhcp >> Version 3.0.3

Isc>>Dhcp >> Version 3.0.4

Isc>>Dhcp >> Version 3.0.4

Isc>>Dhcp >> Version 3.0.4

Isc>>Dhcp >> Version 3.0.4

Isc>>Dhcp >> Version 3.0.4

Isc>>Dhcp >> Version 3.0.5

Isc>>Dhcp >> Version 3.0.5

Isc>>Dhcp >> Version 3.0.6

Isc>>Dhcp >> Version 3.1-esv

Isc>>Dhcp >> Version 3.1.0

Isc>>Dhcp >> Version 3.1.0

Isc>>Dhcp >> Version 3.1.0

Isc>>Dhcp >> Version 3.1.0

Isc>>Dhcp >> Version 3.1.0

Isc>>Dhcp >> Version 3.1.0

Isc>>Dhcp >> Version 3.1.0

Isc>>Dhcp >> Version 3.1.1

Isc>>Dhcp >> Version 3.1.1

Isc>>Dhcp >> Version 3.1.2

Isc>>Dhcp >> Version 3.1.2

Isc>>Dhcp >> Version 3.1.2

Isc>>Dhcp >> Version 3.1.3

Isc>>Dhcp >> Version 3.1.3

Isc>>Dhcp >> Version 3.1.3

Configuraton 0

Isc>>Dhcp >> Version 4.1-esv

Isc>>Dhcp >> Version 4.1-esv

Isc>>Dhcp >> Version 4.2.0

Isc>>Dhcp >> Version 4.2.0

Isc>>Dhcp >> Version 4.2.0

Isc>>Dhcp >> Version 4.2.0

Isc>>Dhcp >> Version 4.2.0

Isc>>Dhcp >> Version 4.2.0

Isc>>Dhcp >> Version 4.2.0

Isc>>Dhcp >> Version 4.2.1

Isc>>Dhcp >> Version 4.2.1

Isc>>Dhcp >> Version 4.2.1

Configuraton 0

Debian>>Debian_linux >> Version 5.0

Debian>>Debian_linux >> Version 6.0

Debian>>Debian_linux >> Version 7.0

Configuraton 0

Canonical>>Ubuntu_linux >> Version 6.06

Canonical>>Ubuntu_linux >> Version 8.04

Canonical>>Ubuntu_linux >> Version 9.10

Canonical>>Ubuntu_linux >> Version 10.04

Canonical>>Ubuntu_linux >> Version 10.10

References

http://www.securityfocus.com/bid/47176
Tags : vdb-entry, x_refsource_BID
http://www.vupen.com/english/advisories/2011/0886
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/44103
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2011-0840.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/44037
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2011/0926
Tags : vdb-entry, x_refsource_VUPEN
http://marc.info/?l=bugtraq&m=133226187115472&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/44127
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2011:073
Tags : vendor-advisory, x_refsource_MANDRIVA
http://marc.info/?l=bugtraq&m=133226187115472&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.vupen.com/english/advisories/2011/0909
Tags : vdb-entry, x_refsource_VUPEN
http://www.osvdb.org/71493
Tags : vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/44090
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/44048
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2011/0879
Tags : vdb-entry, x_refsource_VUPEN
http://www.kb.cert.org/vuls/id/107886
Tags : third-party-advisory, x_refsource_CERT-VN
http://securitytracker.com/id?1025300
Tags : vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2011/1000
Tags : vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2011/0915
Tags : vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2011/0965
Tags : vdb-entry, x_refsource_VUPEN
https://www.exploit-db.com/exploits/37623/
Tags : exploit, x_refsource_EXPLOIT-DB
http://security.gentoo.org/glsa/glsa-201301-06.xml
Tags : vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/44180
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2011/dsa-2217
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.ubuntu.com/usn/USN-1108-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.debian.org/security/2011/dsa-2216
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.redhat.com/support/errata/RHSA-2011-0428.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/44089
Tags : third-party-advisory, x_refsource_SECUNIA