VAR-201104-0082
Vulnerability from variot - Updated: 2026-03-09 22:43dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script. The ISC dhclient contains a vulnerability that could allow a remote attacker to execute arbitrary code on the client machine. Apple From Apple Time Capsule and AirPort Base Station (802.11n) Firmware update for has been released.Crafted DHCP Any command may be executed by processing the response. Depending on the script and OS, this can result in execution of exploit code on the client.
CVSS Score: 6.8 (AV:A/AC:L/Au:N/C:P/I:N/A:C)
For more information on CVSS scores, visit http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2
Workarounds:
On SUSE systems, it is possible to disable hostname update by setting DHCLIENT_SET_HOSTNAME="no" in /etc/sysconfig/network/dhcp.
Other systems may add following line to dhclient-script at the beginning of the set_hostname() function:
new_host_name=${new_host_name//[^-.a-zA-Z0-9]/}
In environments where filters/acls can be put into place to limit clients to accessing only legitimate dhcp servers, this will protect clients from rogue dhcp servers deliberately trying to exploit this bug. However, this will not protect from compromised servers.
Active exploits:
None known at this time. https://www.isc.org/downloads/all
No patch is available for 4.0.x as it is EOL. Anyone running 4.1.x should upgrade to 4.1-ESV-R2. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-2216-1 security@debian.org http://www.debian.org/security/ Nico Golde April 10, 2011 http://www.debian.org/security/faq
Package : isc-dhcp Vulnerability : missing input sanitization Problem type : remote Debian-specific: no CVE ID : CVE-2011-0997 Debian bug : 621099
Sebastian Krahmer and Marius Tomaschewski discovered that dhclient of isc-dhcp, a DHCP client, is not properly filtering shell meta-characters in certain options in DHCP server responses. These options are reused in an insecure fashion by dhclient scripts.
For the oldstable distribution (lenny), this problem has been fixed in additional update for dhcp3.
For the stable distribution (squeeze), this problem has been fixed in version 4.1.1-P1-15+squeeze2.
For the testing distribution (wheezy), this problem will be fixed soon.
For the unstable distribution (sid), this problem has been fixed in version 4.1.1-P1-16.1.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAk2iJ1AACgkQHYflSXNkfP8fEwCglH3YEMa8hlo7ChGFlvT7K9v5 BMcAoIuGqJofENG1o5SiXU1/E9qEF/Am =5Q/C -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201301-06
http://security.gentoo.org/
Severity: Normal Title: ISC DHCP: Denial of Service Date: January 09, 2013 Bugs: #362453, #378799, #393617, #398763, #428120, #434880 ID: 201301-06
Synopsis
Multiple vulnerabilities have been found in ISC DHCP, the worst of which may allow remote Denial of Service.
Background
ISC DHCP is a Dynamic Host Configuration Protocol (DHCP) client/server.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/dhcp < 4.2.4_p2 >= 4.2.4_p2
Description
Multiple vulnerabilities have been discovered in ISC DHCP. Please review the CVE identifiers referenced below for details.
Resolution
All ISC DHCP users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/dhcp-4.2.4_p2"
References
[ 1 ] CVE-2011-0997 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0997 [ 2 ] CVE-2011-2748 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2748 [ 3 ] CVE-2011-2749 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2749 [ 4 ] CVE-2011-4539 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4539 [ 5 ] CVE-2011-4868 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4868 [ 6 ] CVE-2012-3570 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3570 [ 7 ] CVE-2012-3571 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3571 [ 8 ] CVE-2012-3954 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3954 [ 9 ] CVE-2012-3955 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3955
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201301-06.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . This issue is addressed by stripping shell meta-characters in dhclient-script.
It is recommended that AirPort Utility 5.5.3 or later be installed before upgrading to Firmware version 7.6. ----------------------------------------------------------------------
Q1 Factsheets released:
http://secunia.com/resources/factsheets/2011_vendor/
TITLE: ISC DHCP "dhclient" Response Processing Input Sanitation Vulnerability
SECUNIA ADVISORY ID: SA44037
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/44037/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=44037
RELEASE DATE: 2011-04-07
DISCUSS ADVISORY: http://secunia.com/advisories/44037/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/44037/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44037
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in ISC DHCP, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to certain shell meta-characters not being stripped or escaped when processing responses from a DHCP server. This can be exploited to submit shell commands to the "dhclient-script" script via e.g. a specially crafted "hostname" response.
The vulnerability is reported in versions 3.0.x through 4.2.x.
SOLUTION: Update to version 3.1-ESV-R1 and 4.1-ESV-R2 or 4.2.1-P1.
Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
PROVIDED AND/OR DISCOVERED BY: The vendor credits Sebastian Krahmer and Marius Tomaschewski, SUSE Security Team.
ORIGINAL ADVISORY: https://www.isc.org/software/dhcp/advisories/cve-2011-0997
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.6,
"vendor": "isc",
"version": "4.2.0"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.6,
"vendor": "isc",
"version": "4.1-esv"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.6,
"vendor": "isc",
"version": "4.2.1"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "6.0"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.0"
},
{
"_id": null,
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "10.04"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.0.2"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.0.6"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.0.1"
},
{
"_id": null,
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "6.06"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.0.3"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.1.3"
},
{
"_id": null,
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "9.10"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.1.2"
},
{
"_id": null,
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "10.10"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.0.5"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.1.0"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "7.0"
},
{
"_id": null,
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "8.04"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.1.1"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "5.0"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.1-esv"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.0.4"
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "debian gnu linux",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "fedora",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "internet consortium",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "mandriva s a",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "red hat",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "slackware linux",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "ubuntu",
"version": null
},
{
"_id": null,
"model": "airmac base station",
"scope": "lt",
"trust": 0.8,
"vendor": "apple",
"version": "7.6"
},
{
"_id": null,
"model": "time capsule",
"scope": null,
"trust": 0.8,
"vendor": "apple",
"version": null
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#107886"
},
{
"db": "CNNVD",
"id": "CNNVD-201104-043"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-003066"
},
{
"db": "NVD",
"id": "CVE-2011-0997"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:apple:airport_base_station_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:apple:time_capsule",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-003066"
}
]
},
"credits": {
"_id": null,
"data": "Debian",
"sources": [
{
"db": "PACKETSTORM",
"id": "100273"
},
{
"db": "PACKETSTORM",
"id": "100274"
}
],
"trust": 0.2
},
"cve": "CVE-2011-0997",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2011-0997",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2011-0997",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#107886",
"trust": 0.8,
"value": "11.34"
},
{
"author": "NVD",
"id": "CVE-2011-0997",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201104-043",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2011-0997",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#107886"
},
{
"db": "VULMON",
"id": "CVE-2011-0997"
},
{
"db": "CNNVD",
"id": "CNNVD-201104-043"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-003066"
},
{
"db": "NVD",
"id": "CVE-2011-0997"
}
]
},
"description": {
"_id": null,
"data": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script. The ISC dhclient contains a vulnerability that could allow a remote attacker to execute arbitrary code on the client machine. Apple From Apple Time Capsule and AirPort Base Station (802.11n) Firmware update for has been released.Crafted DHCP Any command may be executed by processing the response. Depending on the script and OS, this can result in execution of exploit code on the client. \n\nCVSS Score: 6.8 (AV:A/AC:L/Au:N/C:P/I:N/A:C)\n\nFor more information on CVSS scores, visit http://nvd.nist.gov/cvss.cfm?calculator\u0026adv\u0026version=2 \n\nWorkarounds: \n\nOn SUSE systems, it is possible to disable hostname update by setting DHCLIENT_SET_HOSTNAME=\"no\" in /etc/sysconfig/network/dhcp. \n\nOther systems may add following line to dhclient-script at the beginning of the set_hostname() function:\n\nnew_host_name=${new_host_name//[^-.a-zA-Z0-9]/}\n\nIn environments where filters/acls can be put into place to limit clients to accessing only legitimate dhcp servers, this will protect clients from rogue dhcp servers deliberately trying to exploit this bug. However, this will not protect from compromised servers. \n\n\nActive exploits: \n\nNone known at this time. https://www.isc.org/downloads/all\n\nNo patch is available for 4.0.x as it is EOL. Anyone running 4.1.x should upgrade to 4.1-ESV-R2. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2216-1 security@debian.org\nhttp://www.debian.org/security/ Nico Golde\nApril 10, 2011 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : isc-dhcp\nVulnerability : missing input sanitization\nProblem type : remote\nDebian-specific: no\nCVE ID : CVE-2011-0997\nDebian bug : 621099\n\nSebastian Krahmer and Marius Tomaschewski discovered that dhclient of\nisc-dhcp, a DHCP client, is not properly filtering shell meta-characters\nin certain options in DHCP server responses. These options are reused in\nan insecure fashion by dhclient scripts. \n\n\nFor the oldstable distribution (lenny), this problem has been fixed in\nadditional update for dhcp3. \n\nFor the stable distribution (squeeze), this problem has been fixed in\nversion 4.1.1-P1-15+squeeze2. \n\nFor the testing distribution (wheezy), this problem will be fixed soon. \n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 4.1.1-P1-16.1. \n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.10 (GNU/Linux)\n\niEYEARECAAYFAk2iJ1AACgkQHYflSXNkfP8fEwCglH3YEMa8hlo7ChGFlvT7K9v5\nBMcAoIuGqJofENG1o5SiXU1/E9qEF/Am\n=5Q/C\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201301-06\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: ISC DHCP: Denial of Service\n Date: January 09, 2013\n Bugs: #362453, #378799, #393617, #398763, #428120, #434880\n ID: 201301-06\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in ISC DHCP, the worst of\nwhich may allow remote Denial of Service. \n\nBackground\n==========\n\nISC DHCP is a Dynamic Host Configuration Protocol (DHCP) client/server. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/dhcp \u003c 4.2.4_p2 \u003e= 4.2.4_p2\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in ISC DHCP. Please\nreview the CVE identifiers referenced below for details. \n\nResolution\n==========\n\nAll ISC DHCP users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/dhcp-4.2.4_p2\"\n\nReferences\n==========\n\n[ 1 ] CVE-2011-0997\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0997\n[ 2 ] CVE-2011-2748\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2748\n[ 3 ] CVE-2011-2749\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2749\n[ 4 ] CVE-2011-4539\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4539\n[ 5 ] CVE-2011-4868\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4868\n[ 6 ] CVE-2012-3570\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3570\n[ 7 ] CVE-2012-3571\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3571\n[ 8 ] CVE-2012-3954\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3954\n[ 9 ] CVE-2012-3955\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3955\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201301-06.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2013 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. This issue is addressed by stripping shell meta-characters\nin dhclient-script. \n\nIt is recommended that AirPort Utility 5.5.3 or later be installed\nbefore upgrading to Firmware version 7.6. ----------------------------------------------------------------------\n\n\nQ1 Factsheets released:\n\nhttp://secunia.com/resources/factsheets/2011_vendor/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nISC DHCP \"dhclient\" Response Processing Input Sanitation\nVulnerability\n\nSECUNIA ADVISORY ID:\nSA44037\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/44037/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44037\n\nRELEASE DATE:\n2011-04-07\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/44037/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/44037/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44037\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in ISC DHCP, which can be exploited\nby malicious people to compromise a vulnerable system. \n\nThe vulnerability is caused due to certain shell meta-characters not\nbeing stripped or escaped when processing responses from a DHCP\nserver. This can be exploited to submit shell commands to the\n\"dhclient-script\" script via e.g. a specially crafted \"hostname\"\nresponse. \n\nThe vulnerability is reported in versions 3.0.x through 4.2.x. \n\nSOLUTION:\nUpdate to version 3.1-ESV-R1 and 4.1-ESV-R2 or 4.2.1-P1. \n\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Sebastian Krahmer and Marius Tomaschewski, SUSE\nSecurity Team. \n\nORIGINAL ADVISORY:\nhttps://www.isc.org/software/dhcp/advisories/cve-2011-0997\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2011-0997"
},
{
"db": "CERT/CC",
"id": "VU#107886"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-003066"
},
{
"db": "VULMON",
"id": "CVE-2011-0997"
},
{
"db": "PACKETSTORM",
"id": "100160"
},
{
"db": "PACKETSTORM",
"id": "100273"
},
{
"db": "PACKETSTORM",
"id": "119354"
},
{
"db": "PACKETSTORM",
"id": "106987"
},
{
"db": "PACKETSTORM",
"id": "100274"
},
{
"db": "PACKETSTORM",
"id": "100149"
}
],
"trust": 2.97
},
"external_ids": {
"_id": null,
"data": [
{
"db": "CERT/CC",
"id": "VU#107886",
"trust": 3.3
},
{
"db": "NVD",
"id": "CVE-2011-0997",
"trust": 3.1
},
{
"db": "SECUNIA",
"id": "44037",
"trust": 1.9
},
{
"db": "VUPEN",
"id": "ADV-2011-1000",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2011-0909",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2011-0915",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2011-0926",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2011-0965",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2011-0879",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2011-0886",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "44103",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "44127",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "44048",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "44180",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "44089",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "44090",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1025300",
"trust": 1.7
},
{
"db": "JUNIPER",
"id": "JSA10761",
"trust": 1.7
},
{
"db": "BID",
"id": "47176",
"trust": 1.7
},
{
"db": "OSVDB",
"id": "71493",
"trust": 1.7
},
{
"db": "EXPLOIT-DB",
"id": "37623",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2011-003066",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201104-043",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2011-0997",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "100160",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "100273",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "119354",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "106987",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "100274",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "100149",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#107886"
},
{
"db": "VULMON",
"id": "CVE-2011-0997"
},
{
"db": "PACKETSTORM",
"id": "100160"
},
{
"db": "PACKETSTORM",
"id": "100273"
},
{
"db": "PACKETSTORM",
"id": "119354"
},
{
"db": "PACKETSTORM",
"id": "106987"
},
{
"db": "PACKETSTORM",
"id": "100274"
},
{
"db": "PACKETSTORM",
"id": "100149"
},
{
"db": "CNNVD",
"id": "CNNVD-201104-043"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-003066"
},
{
"db": "NVD",
"id": "CVE-2011-0997"
}
]
},
"id": "VAR-201104-0082",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.413494225
},
"last_update_date": "2026-03-09T22:43:44.086000Z",
"patch": {
"_id": null,
"data": [
{
"title": "HT5005",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT5005"
},
{
"title": "ISC DHCP dhclient Response processing shell Measures to fix meta-character code execution vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=113225"
},
{
"title": "Debian CVElist Bug Report Logs: isc-dhcp-client: CVE-2011-0997",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=a3bf1099a3f6410da5cb17491cb28710"
},
{
"title": "Ubuntu Security Notice: dhcp3 vulnerability",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-1108-2"
},
{
"title": "Ubuntu Security Notice: dhcp3 vulnerability",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-1108-1"
},
{
"title": "Debian Security Advisories: DSA-2216-1 isc-dhcp -- missing input sanitization",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=9079594e67dfba2ce5fd90c652ce64af"
},
{
"title": "Debian CVElist Bug Report Logs: CVE-2011-2716 udhcpc insufficient checking of DHCP options",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=d937c5addcd54815f7f0480b4b3a55e2"
},
{
"title": "VMware Security Advisories: VMware ESX third party updates for Service Console packages glibc and dhcp",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=386db0c9014e75eeed9029418ea6714f"
},
{
"title": "Citrix Security Bulletins: Archive: Citrix XenServer Multiple Security Updates",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=30a988053a9b9c888e66371d7b3040f2"
},
{
"title": "Threatpost",
"trust": 0.1,
"url": "https://threatpost.com/critical-rce-bug-avaya-voip-phones/147122/"
},
{
"title": "BleepingComputer",
"trust": 0.1,
"url": "https://www.bleepingcomputer.com/news/security/avaya-voip-phones-harbored-10-year-old-vulnerability/"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2011-0997"
},
{
"db": "CNNVD",
"id": "CNNVD-201104-043"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-003066"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-20",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-003066"
},
{
"db": "NVD",
"id": "CVE-2011-0997"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.6,
"url": "http://www.kb.cert.org/vuls/id/107886"
},
{
"trust": 1.8,
"url": "http://security.gentoo.org/glsa/glsa-201301-06.xml"
},
{
"trust": 1.8,
"url": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997"
},
{
"trust": 1.7,
"url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10761"
},
{
"trust": 1.7,
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-april/057888.html"
},
{
"trust": 1.7,
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-april/058279.html"
},
{
"trust": 1.7,
"url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/44037"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/44048"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/44089"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/44090"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/44103"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/44127"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/44180"
},
{
"trust": 1.7,
"url": "http://securitytracker.com/id?1025300"
},
{
"trust": 1.7,
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593345"
},
{
"trust": 1.7,
"url": "http://www.debian.org/security/2011/dsa-2216"
},
{
"trust": 1.7,
"url": "http://www.debian.org/security/2011/dsa-2217"
},
{
"trust": 1.7,
"url": "http://www.mandriva.com/security/advisories?name=mdvsa-2011:073"
},
{
"trust": 1.7,
"url": "http://www.osvdb.org/71493"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2011-0428.html"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2011-0840.html"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/47176"
},
{
"trust": 1.7,
"url": "http://www.ubuntu.com/usn/usn-1108-1"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2011/0879"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2011/0886"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2011/0909"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2011/0915"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2011/0926"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2011/0965"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2011/1000"
},
{
"trust": 1.7,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832"
},
{
"trust": 1.7,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66580"
},
{
"trust": 1.7,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a12812"
},
{
"trust": 1.7,
"url": "https://www.exploit-db.com/exploits/37623/"
},
{
"trust": 0.8,
"url": "about vulnerability notes"
},
{
"trust": 0.8,
"url": "contact us about this vulnerability"
},
{
"trust": 0.8,
"url": "provide a vendor statement"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0997"
},
{
"trust": 0.8,
"url": "https://jvn.jp/cert/jvnvu107886/"
},
{
"trust": 0.8,
"url": "https://jvn.jp/cert/jvnvu309451/"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0997"
},
{
"trust": 0.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-0997"
},
{
"trust": 0.2,
"url": "http://secunia.com/"
},
{
"trust": 0.2,
"url": "http://www.debian.org/security/faq"
},
{
"trust": 0.2,
"url": "http://www.debian.org/security/"
},
{
"trust": 0.2,
"url": "http://lists.grok.org.uk/full-disclosure-charter.html"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/20.html"
},
{
"trust": 0.1,
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621099"
},
{
"trust": 0.1,
"url": "https://www.rapid7.com/db/vulnerabilities/linuxrpm-rhsa-2011-0428"
},
{
"trust": 0.1,
"url": "https://usn.ubuntu.com/1108-2/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.isc.org/downloads/all"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/cvss.cfm?calculator\u0026adv\u0026version=2"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2748"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0997"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-3955"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3571"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-3954"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4539"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-3570"
},
{
"trust": 0.1,
"url": "http://creativecommons.org/licenses/by-sa/2.5"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4868"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3954"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4539"
},
{
"trust": 0.1,
"url": "http://security.gentoo.org/"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2749"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2749"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3570"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3955"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-3571"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2748"
},
{
"trust": 0.1,
"url": "https://bugs.gentoo.org."
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4868"
},
{
"trust": 0.1,
"url": "https://www.apple.com/support/security/pgp/"
},
{
"trust": 0.1,
"url": "http://www.apple.com/support/downloads/"
},
{
"trust": 0.1,
"url": "http://support.apple.com/kb/ht1222"
},
{
"trust": 0.1,
"url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44037"
},
{
"trust": 0.1,
"url": "http://secunia.com/products/corporate/evm/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/44037/#comments"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/44037/"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/personal/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/resources/factsheets/2011_vendor/"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#107886"
},
{
"db": "VULMON",
"id": "CVE-2011-0997"
},
{
"db": "PACKETSTORM",
"id": "100160"
},
{
"db": "PACKETSTORM",
"id": "100273"
},
{
"db": "PACKETSTORM",
"id": "119354"
},
{
"db": "PACKETSTORM",
"id": "106987"
},
{
"db": "PACKETSTORM",
"id": "100274"
},
{
"db": "PACKETSTORM",
"id": "100149"
},
{
"db": "CNNVD",
"id": "CNNVD-201104-043"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-003066"
},
{
"db": "NVD",
"id": "CVE-2011-0997"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "CERT/CC",
"id": "VU#107886",
"ident": null
},
{
"db": "VULMON",
"id": "CVE-2011-0997",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "100160",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "100273",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "119354",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "106987",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "100274",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "100149",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201104-043",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2011-003066",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2011-0997",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2011-04-05T00:00:00",
"db": "CERT/CC",
"id": "VU#107886",
"ident": null
},
{
"date": "2011-04-08T00:00:00",
"db": "VULMON",
"id": "CVE-2011-0997",
"ident": null
},
{
"date": "2011-04-07T15:19:36",
"db": "PACKETSTORM",
"id": "100160",
"ident": null
},
{
"date": "2011-04-11T14:45:39",
"db": "PACKETSTORM",
"id": "100273",
"ident": null
},
{
"date": "2013-01-09T02:26:37",
"db": "PACKETSTORM",
"id": "119354",
"ident": null
},
{
"date": "2011-11-15T05:14:36",
"db": "PACKETSTORM",
"id": "106987",
"ident": null
},
{
"date": "2011-04-11T14:46:07",
"db": "PACKETSTORM",
"id": "100274",
"ident": null
},
{
"date": "2011-04-06T08:45:32",
"db": "PACKETSTORM",
"id": "100149",
"ident": null
},
{
"date": "2011-04-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201104-043",
"ident": null
},
{
"date": "2011-11-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-003066",
"ident": null
},
{
"date": "2011-04-08T15:17:27.387000",
"db": "NVD",
"id": "CVE-2011-0997",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2011-05-06T00:00:00",
"db": "CERT/CC",
"id": "VU#107886",
"ident": null
},
{
"date": "2020-04-01T00:00:00",
"db": "VULMON",
"id": "CVE-2011-0997",
"ident": null
},
{
"date": "2020-04-03T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201104-043",
"ident": null
},
{
"date": "2011-11-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-003066",
"ident": null
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2011-0997",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "100160"
},
{
"db": "PACKETSTORM",
"id": "119354"
},
{
"db": "PACKETSTORM",
"id": "106987"
},
{
"db": "CNNVD",
"id": "CNNVD-201104-043"
}
],
"trust": 0.9
},
"title": {
"_id": null,
"data": "ISC dhclient vulnerability",
"sources": [
{
"db": "CERT/CC",
"id": "VU#107886"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201104-043"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.