Security researchers at Google have uncovered a serious remote command-line injection vulnerability on Red Hat Linux DHCP software and derivatives on Fedora.
Set to Code CVE-2018-1111, this vulnerability allows an attacker to execute remote code without root privileges on the victim machine.
Whenever a computer joins the network, DHCP software will allow the machine to automatically receive network configuration parameters such asIP address,DNS serverfrom the host of theDynamic Host Control Protocol (DHCP).
The vulnerability lies in the NetworkManager integration scenario in DHCP client packages.Felix Wilhelm from the Google security team found that an attacker infected with a DHCP server or connected to the same network with a victim could exploit it by forging a DHCP response, eventually executing code on the machine. victim.
Details of this vulnerability were not revealed to him and he said that the code proves PoC very short, putting in a tweet line is enough.Barkın Kılı, a researcher from Turkey, posted the PoC code on Twitter.
Red Hat confirms this vulnerability affects Red Hat Linux 6 and 7 and all those affected by the affected DHCP clients should update to the latest version.
“Users should disable or delete affected scripts, but this will prevent some configurations from being provided by the DHCP server, such as NTP addresses or NIS servers,“Red Hat said.
Fedora also released new HDCP fixes for Fedora 26, 27 and 28.
Other Linux kernels such as OpenSUSE or Ubuntu are not affected by DHCP not using the default NetworkManager script.