Executive Summary

Summary
Title klibc: Command Injection
Informations
Name GLSA-201309-21 First vendor Publication 2013-09-26
Vendor Gentoo Last vendor Modification 2013-09-26
Severity (Vendor) Normal Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 9.8
Base Score 9.8 Environmental Score 9.8
impact SubScore 5.9 Temporal Score 9.8
Exploitabality Sub Score 3.9
 
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

A vulnerability in klibc could allow remote attackers to execute arbitrary shell code.

Background

klibc is a minimalistic libc used for making an initramfs.

Description

The ipconfig utility in klibc writes DHCP options to
/tmp/net-$DEVICE.conf, and this file is later sourced by other scripts to get defined variables. The options written to this file are not properly escaped.

Impact

A remote attacker could send a specially crafted DHCP reply, which could execute arbitrary shell code with the privileges of any process which sources DHCP options.

Workaround

There is no known workaround at this time.

Resolution

All klibc users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/klibc-1.5.25"

References

[ 1 ] CVE-2011-1930 : http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1930

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201309-21.xml

Original Source

Url : http://security.gentoo.org/glsa/glsa-201309-21.xml

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 3
Os 3

Open Source Vulnerability Database (OSVDB)

Id Description
73394 klibc DHCP Response Handling Metacharacter Shell Command Execution

klibc contains a flaw related to a failure to properly strip shell meta-characters when processing responses from DHCP servers. This may allow a remote attacker to use a crafted hostname response to execute arbitrary shell commands.

Nessus® Vulnerability Scanner

Date Description
2013-09-27 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201309-21.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2020-05-23 13:03:43
  • Multiple Updates
2014-02-17 11:37:46
  • Multiple Updates
2013-09-27 05:19:11
  • First insertion