Vigil@nce - dhcp6c: shell command injection
August 2011 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker owning a malicious DHCP server can return a special
hostname, in order to inject a shell command in dhcp6c.
Severity: 2/4
Creation date: 25/07/2011
IMPACTED PRODUCTS
- Unix - plateform
DESCRIPTION OF THE VULNERABILITY
The Linux dhcp6c program queries a DHCP server, in order to obtain
an IPv6 address and a computer name.
However, a malicious or corrupted DHCP server can return a
computer name like:
beginName`command`endName
beginName;command;endName
As dhclient does not filter special shell characters, the shell
command received from the server is run on the client.
An attacker owning a malicious DHCP server can therefore return a
special hostname, in order to inject a shell command in dhcp6c.
This vulnerability is the same as VIGILANCE-VUL-10522
(https://vigilance.fr/tree/1/10522) which impacts ISC dhclient.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/dhcp6c-shell-command-injection-10869