Lucene search

K
amazonAmazonALAS-2018-1024
HistoryMay 25, 2018 - 6:16 p.m.

Low: dhcp

2018-05-2518:16:00
alas.aws.amazon.com
23

7.5 High

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.9 High

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:M/Au:N/C:C/I:C/A:C

0.973 High

EPSS

Percentile

99.9%

Issue Overview:

Command injection vulnerability in the DHCP client NetworkManager integration script
A command injection flaw was found in the NetworkManager integration script included in the DHCP client packages in Amazon Linux 2. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol. (CVE-2018-1111 )

Note: As mentioned above, the fix for this issue is in the NetworkManager integration script included with the dhcp package. The severity of this advisory has been lowered to a low as the Amazon Linux AMI does not use NetworkManager.

Affected Packages:

dhcp

Issue Correction:
Run yum update dhcp to update your system.

New Packages:

i686:  
    dhcp-devel-4.1.1-53.P1.28.amzn1.i686  
    dhcp-debuginfo-4.1.1-53.P1.28.amzn1.i686  
    dhcp-common-4.1.1-53.P1.28.amzn1.i686  
    dhcp-4.1.1-53.P1.28.amzn1.i686  
    dhclient-4.1.1-53.P1.28.amzn1.i686  
  
src:  
    dhcp-4.1.1-53.P1.28.amzn1.src  
  
x86_64:  
    dhcp-debuginfo-4.1.1-53.P1.28.amzn1.x86_64  
    dhcp-devel-4.1.1-53.P1.28.amzn1.x86_64  
    dhcp-4.1.1-53.P1.28.amzn1.x86_64  
    dhclient-4.1.1-53.P1.28.amzn1.x86_64  
    dhcp-common-4.1.1-53.P1.28.amzn1.x86_64  

Additional References

Red Hat: CVE-2018-1111

Mitre: CVE-2018-1111

7.5 High

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.9 High

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:M/Au:N/C:C/I:C/A:C

0.973 High

EPSS

Percentile

99.9%