Lucene search

K
saintSAINT CorporationSAINT:AD161DA8F25E93FF26B36F6C31115364
HistoryMay 18, 2018 - 12:00 a.m.

Red Hat DHCP client NetworkManager integration script command injection

2018-05-1800:00:00
SAINT Corporation
my.saintcorporation.com
577

7.5 High

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.9 High

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:M/Au:N/C:C/I:C/A:C

0.972 High

EPSS

Percentile

99.8%

Added: 05/18/2018
CVE: CVE-2018-1111
BID: 104195

Background

The DHCP client on Red Hat Enterprise Linux includes a script which provides integration with the NetworkManager subsystem.

Problem

A command injection vulnerability in the NetworkManager integration script could allow arbitrary command execution when the affected system receives a specially crafted response from a malicious DHCP server on the local network.

Resolution

Upgrade to the latest **dhclient** package from your Linux vendor.

References

<https://access.redhat.com/security/vulnerabilities/3442151&gt;
<https://thehackernews.com/2018/05/linux-dhcp-hacking.html&gt;

Limitations

A vulnerable target on the same network as the SAINTexploit host must send out a DHCP request in order for this exploit to succeed.

Warning: running this exploit could cause connectivity problems for other hosts on the network if the parameters aren’t properly configured.

This exploit requires dnsmasq to be installed on the SAINTexploit host. It attempts to install it if not already installed.

Platforms

Linux

7.5 High

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.9 High

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:M/Au:N/C:C/I:C/A:C

0.972 High

EPSS

Percentile

99.8%