ID

VAR-201104-0082


CVE

CVE-2011-0997


TITLE

ISC dhclient vulnerability

Trust: 0.8

sources: CERT/CC: VU#107886

DESCRIPTION

dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script. In addition, ISC Has released the following vulnerability information. Depending on the script and OS, this can result in execution of exploit code on the client."A remote attacker could execute arbitrary code. Apple From Apple Time Capsule and AirPort Base Station (802.11n) Firmware update for has been released.Crafted DHCP Any command may be executed by processing the response. A remote attacker can exploit this issue through a rogue DHCP server. Additionally for Corporate Server 4 and Enterprise Server 5 ISC DHCP has been upgraded from the 3.0.7 version to the 4.1.2-P1 version which brings many enhancements such as better ipv6 support. Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490 The updated packages have upgraded to the 4.1.2-P1 version and patched to correct this issue. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0997 http://ftp.isc.org/isc/dhcp/dhcp-4.1.2-P1-RELNOTES https://www.isc.org/software/dhcp/advisories/cve-2011-0997 _______________________________________________________________________ Updated Packages: Mandriva Linux 2009.0: 0fe2b147ebdba8b68f69ddc27160db5c 2009.0/i586/dhcp-client-4.1.2-0.4mdv2009.0.i586.rpm f4ee7090da2bec5cb4482f2fa21beb8b 2009.0/i586/dhcp-common-4.1.2-0.4mdv2009.0.i586.rpm a4a5bd2f2d8f4d40a4c60d5dde55307c 2009.0/i586/dhcp-devel-4.1.2-0.4mdv2009.0.i586.rpm 814bc88e335fb03901f326300ae92961 2009.0/i586/dhcp-doc-4.1.2-0.4mdv2009.0.i586.rpm ec52571bb8002e9394b1eb6e6fc95b64 2009.0/i586/dhcp-relay-4.1.2-0.4mdv2009.0.i586.rpm e7fed43b5db92babf8ca3acbd7210b7f 2009.0/i586/dhcp-server-4.1.2-0.4mdv2009.0.i586.rpm 18489ac449e257f1fa9aad9e7a054b45 2009.0/SRPMS/dhcp-4.1.2-0.4mdv2009.0.src.rpm Mandriva Linux 2009.0/X86_64: b557459f67de2b8ec481d313d9a26cb2 2009.0/x86_64/dhcp-client-4.1.2-0.4mdv2009.0.x86_64.rpm b4ea7a9670866fff6cd3f4eb77073a84 2009.0/x86_64/dhcp-common-4.1.2-0.4mdv2009.0.x86_64.rpm 4f9a9c9a9815697e17a65b942771e31d 2009.0/x86_64/dhcp-devel-4.1.2-0.4mdv2009.0.x86_64.rpm df18345c665846817880f815af0ad0e8 2009.0/x86_64/dhcp-doc-4.1.2-0.4mdv2009.0.x86_64.rpm eac313ff664e3ea9f8e4c3818d7b7387 2009.0/x86_64/dhcp-relay-4.1.2-0.4mdv2009.0.x86_64.rpm 48cca35591072588de0e1b9f00ca88eb 2009.0/x86_64/dhcp-server-4.1.2-0.4mdv2009.0.x86_64.rpm 18489ac449e257f1fa9aad9e7a054b45 2009.0/SRPMS/dhcp-4.1.2-0.4mdv2009.0.src.rpm Mandriva Linux 2010.0: 88ba2b9d0ccfddf8b1b6f516851d08ce 2010.0/i586/dhcp-client-4.1.2-0.4mdv2010.0.i586.rpm 1475209ee7b9fb9b7f26ad5b20afcdcf 2010.0/i586/dhcp-common-4.1.2-0.4mdv2010.0.i586.rpm ea29d2bfd21b02a56057cd36dc21f43a 2010.0/i586/dhcp-devel-4.1.2-0.4mdv2010.0.i586.rpm 067c3ac4f7530e447f82bbe4326253a3 2010.0/i586/dhcp-doc-4.1.2-0.4mdv2010.0.i586.rpm 409516cfb0004d5f4522040b81433ce7 2010.0/i586/dhcp-relay-4.1.2-0.4mdv2010.0.i586.rpm a23871dfa6632571cdf4a2559941ad89 2010.0/i586/dhcp-server-4.1.2-0.4mdv2010.0.i586.rpm 265c9ec68af7e23baf8b1b6fcc4cc64f 2010.0/SRPMS/dhcp-4.1.2-0.4mdv2010.0.src.rpm Mandriva Linux 2010.0/X86_64: 403dfe148141d926bc2f5e31c18360ba 2010.0/x86_64/dhcp-client-4.1.2-0.4mdv2010.0.x86_64.rpm 2cd0331b9935442a68d606e1d58b0608 2010.0/x86_64/dhcp-common-4.1.2-0.4mdv2010.0.x86_64.rpm 80a31ea430793ce9d2269c9d31aa03bd 2010.0/x86_64/dhcp-devel-4.1.2-0.4mdv2010.0.x86_64.rpm d5053dc644215e70dfc5380afdbc90c4 2010.0/x86_64/dhcp-doc-4.1.2-0.4mdv2010.0.x86_64.rpm 377fe3099561dd0a795617977164b91f 2010.0/x86_64/dhcp-relay-4.1.2-0.4mdv2010.0.x86_64.rpm 57b98ba8696c7a7d20ab96a823f4ff0d 2010.0/x86_64/dhcp-server-4.1.2-0.4mdv2010.0.x86_64.rpm 265c9ec68af7e23baf8b1b6fcc4cc64f 2010.0/SRPMS/dhcp-4.1.2-0.4mdv2010.0.src.rpm Mandriva Linux 2010.1: 5b603213aa47a9772cf786ae6ee046da 2010.1/i586/dhcp-client-4.1.2-0.4mdv2010.2.i586.rpm 3046be07aaa09d1b39fcc8c07ef25e58 2010.1/i586/dhcp-common-4.1.2-0.4mdv2010.2.i586.rpm 1b5a481f6db0b53e666884cfda6ac44c 2010.1/i586/dhcp-devel-4.1.2-0.4mdv2010.2.i586.rpm 279beab531b59a715c946a00bd58fc48 2010.1/i586/dhcp-doc-4.1.2-0.4mdv2010.2.i586.rpm a328ab24b56f1ac03f8f420acd0a3806 2010.1/i586/dhcp-relay-4.1.2-0.4mdv2010.2.i586.rpm f7c61c55748270add2fe45d3245895c8 2010.1/i586/dhcp-server-4.1.2-0.4mdv2010.2.i586.rpm 30d4e8965d393765fb98b425889df126 2010.1/SRPMS/dhcp-4.1.2-0.4mdv2010.2.src.rpm Mandriva Linux 2010.1/X86_64: 27f78c74028b1ea64dbd596c05cfa83f 2010.1/x86_64/dhcp-client-4.1.2-0.4mdv2010.2.x86_64.rpm ab56614386900415fecba15f4c17db13 2010.1/x86_64/dhcp-common-4.1.2-0.4mdv2010.2.x86_64.rpm 535a2eb4b6a4b1f78f47201e0b4249c3 2010.1/x86_64/dhcp-devel-4.1.2-0.4mdv2010.2.x86_64.rpm 64e9bac6fe8f4dbee3e1aebd5d91e977 2010.1/x86_64/dhcp-doc-4.1.2-0.4mdv2010.2.x86_64.rpm 612892e71f2aeddfd8b55cd7ac220247 2010.1/x86_64/dhcp-relay-4.1.2-0.4mdv2010.2.x86_64.rpm 9bb46bca8de30ee4b99bfe09867a3924 2010.1/x86_64/dhcp-server-4.1.2-0.4mdv2010.2.x86_64.rpm 30d4e8965d393765fb98b425889df126 2010.1/SRPMS/dhcp-4.1.2-0.4mdv2010.2.src.rpm Corporate 4.0: f49d86732da26402b022b2d980049c03 corporate/4.0/i586/dhcp-client-4.1.2-0.4.20060mlcs4.i586.rpm acd985bc51c25cc42325befb357b0dcc corporate/4.0/i586/dhcp-common-4.1.2-0.4.20060mlcs4.i586.rpm c01506a802e46af23c8f10a72c6a0eb2 corporate/4.0/i586/dhcp-devel-4.1.2-0.4.20060mlcs4.i586.rpm 81522530fa5e97057d6eeea18ad7bec3 corporate/4.0/i586/dhcp-doc-4.1.2-0.4.20060mlcs4.i586.rpm 2ebfdf7ee9224b7403c4ab5e8370d9ab corporate/4.0/i586/dhcp-relay-4.1.2-0.4.20060mlcs4.i586.rpm c2bbacf8934b9e3dc78cdb49cd811ec9 corporate/4.0/i586/dhcp-server-4.1.2-0.4.20060mlcs4.i586.rpm ac3031a0c5dfeb6274aa28d669e66cba corporate/4.0/SRPMS/dhcp-4.1.2-0.4.20060mlcs4.src.rpm Corporate 4.0/X86_64: 2747bf835e111141b9a91dc320eeab43 corporate/4.0/x86_64/dhcp-client-4.1.2-0.4.20060mlcs4.x86_64.rpm 0c998112346a5da94e09d55c996d6dff corporate/4.0/x86_64/dhcp-common-4.1.2-0.4.20060mlcs4.x86_64.rpm fd38ef505da0c593ef900895abeb1ddc corporate/4.0/x86_64/dhcp-devel-4.1.2-0.4.20060mlcs4.x86_64.rpm 69b3d6cbf21c46828de40a322fd1310d corporate/4.0/x86_64/dhcp-doc-4.1.2-0.4.20060mlcs4.x86_64.rpm c5acb788ae76e674952d656fa9b0d1a5 corporate/4.0/x86_64/dhcp-relay-4.1.2-0.4.20060mlcs4.x86_64.rpm e19db50139a291a7acd23491af5f8d54 corporate/4.0/x86_64/dhcp-server-4.1.2-0.4.20060mlcs4.x86_64.rpm ac3031a0c5dfeb6274aa28d669e66cba corporate/4.0/SRPMS/dhcp-4.1.2-0.4.20060mlcs4.src.rpm Mandriva Enterprise Server 5: 7cbe686b047a6fd6f95cda44669e5862 mes5/i586/dhcp-client-4.1.2-0.4mdvmes5.2.i586.rpm af8b9fe15591b76c11f2257e0cb43a37 mes5/i586/dhcp-common-4.1.2-0.4mdvmes5.2.i586.rpm 2a22a53e6de1a9333c36c5cc250c5ac4 mes5/i586/dhcp-devel-4.1.2-0.4mdvmes5.2.i586.rpm 9ca551145fc79919000a61419e72de37 mes5/i586/dhcp-doc-4.1.2-0.4mdvmes5.2.i586.rpm e9faa5fae712882720b107eb02e51f1f mes5/i586/dhcp-relay-4.1.2-0.4mdvmes5.2.i586.rpm 8568f3bac9dd6654b63ebee94c33275e mes5/i586/dhcp-server-4.1.2-0.4mdvmes5.2.i586.rpm 0e5415cf40dde2931cd1b81aada5e7f7 mes5/SRPMS/dhcp-4.1.2-0.4mdvmes5.2.src.rpm Mandriva Enterprise Server 5/X86_64: 87ae497e9b94fb842718b4fbefb55474 mes5/x86_64/dhcp-client-4.1.2-0.4mdvmes5.2.x86_64.rpm 71d70558972e1f0729513fce69183de2 mes5/x86_64/dhcp-common-4.1.2-0.4mdvmes5.2.x86_64.rpm 0f12150d87816bd1770388d8dc309d21 mes5/x86_64/dhcp-devel-4.1.2-0.4mdvmes5.2.x86_64.rpm 0450f2a86dab4988d1c96a8e9747104f mes5/x86_64/dhcp-doc-4.1.2-0.4mdvmes5.2.x86_64.rpm 6a043f417310b6229e8fb8d967c12a8d mes5/x86_64/dhcp-relay-4.1.2-0.4mdvmes5.2.x86_64.rpm e4281f48c410412f60fd33f095b9199c mes5/x86_64/dhcp-server-4.1.2-0.4mdvmes5.2.x86_64.rpm 0e5415cf40dde2931cd1b81aada5e7f7 mes5/SRPMS/dhcp-4.1.2-0.4mdvmes5.2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFNotZnmqjQ0CJFipgRAsarAJ4zitKb2D4e53sOLX4vqvuPs5tLCACffyPE Y8Ya7GFbhILVKuKTG+Ps+3k= =EXBX -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201301-06 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: ISC DHCP: Denial of Service Date: January 09, 2013 Bugs: #362453, #378799, #393617, #398763, #428120, #434880 ID: 201301-06 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in ISC DHCP, the worst of which may allow remote Denial of Service. Background ========== ISC DHCP is a Dynamic Host Configuration Protocol (DHCP) client/server. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/dhcp < 4.2.4_p2 >= 4.2.4_p2 Description =========== Multiple vulnerabilities have been discovered in ISC DHCP. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All ISC DHCP users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/dhcp-4.2.4_p2" References ========== [ 1 ] CVE-2011-0997 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0997 [ 2 ] CVE-2011-2748 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2748 [ 3 ] CVE-2011-2749 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2749 [ 4 ] CVE-2011-4539 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4539 [ 5 ] CVE-2011-4868 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4868 [ 6 ] CVE-2012-3570 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3570 [ 7 ] CVE-2012-3571 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3571 [ 8 ] CVE-2012-3954 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3954 [ 9 ] CVE-2012-3955 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3955 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201301-06.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c03246498 Version: 1 HPSBMU02752 SSRT100802 rev.1 HP Insight Control Software for Linux (IC-Linux), Remote Execution of Arbitrary Code, Denial of Service (DoS) NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2012-03-20 Last Updated: 2012-03-20 Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS) Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP Insight Control Software for Linux (IC-Linux). References: CVE-2011-3210, CVE-2011-3207, CVE-2011-1097, CVE-2011-0997, CVE-2011-0762, CVE-2010-4645 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Insight Control Software for Linux (IC-Linux) before v7.0 BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2011-3210 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2011-3207 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2011-1097 (AV:N/AC:H/Au:N/C:P/I:P/A:P) 5.1 CVE-2011-0997 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2011-0762 (AV:N/AC:L/Au:S/C:N/I:N/A:P) 4.0 CVE-2010-4645 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided HP Insight Control Software for Linux (IC-Linux) v7.0 to resolve the vulnerabilities. IC-Linux v7.0 is available here: http://h18004.www1.hp.com/products/servers/management/insightcontrol_linux2/index.html HISTORY Version:1 (rev.1) - 20 March 2012 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430 Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2012 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAk9ohHQACgkQ4B86/C0qfVmEggCfXT/u5nvabmw8FARoRUBiVPQq 5fUAoId3XJIwuUyd1UZsUKOKDwoWdkft =vINA -----END PGP SIGNATURE----- . This issue is addressed by stripping shell meta-characters in dhclient-script. It is recommended that AirPort Utility 5.5.3 or later be installed before upgrading to Firmware version 7.6. These options are reused in an insecure fashion by dhclient scripts. For the oldstable distribution (lenny), this problem has been fixed in version 3.1.1-6+lenny5. For the stable (squeeze), testing (wheezy) and unstable (sid) distributions, this problem has been fixed in an additional update for isc-dhcp

Trust: 3.87

sources: NVD: CVE-2011-0997 // CERT/CC: VU#107886 // JVNDB: JVNDB-2011-001456 // JVNDB: JVNDB-2011-003066 // BID: 47176 // VULMON: CVE-2011-0997 // PACKETSTORM: 100277 // PACKETSTORM: 119354 // PACKETSTORM: 111029 // PACKETSTORM: 106987 // PACKETSTORM: 100274

AFFECTED PRODUCTS

vendor:iscmodel:dhcpscope:eqversion:4.2.0

Trust: 1.6

vendor:iscmodel:dhcpscope:eqversion:4.1-esv

Trust: 1.6

vendor:iscmodel:dhcpscope:eqversion:4.2.1

Trust: 1.6

vendor:debianmodel:linuxscope:eqversion:5.0

Trust: 1.3

vendor:vmwaremodel:esxscope:eqversion:4.1

Trust: 1.1

vendor:vmwaremodel:esxscope:eqversion:3.5

Trust: 1.1

vendor:vmwaremodel:esxscope:eqversion:4.0

Trust: 1.1

vendor:debianmodel:linuxscope:eqversion:6.0

Trust: 1.0

vendor:iscmodel:dhcpscope:eqversion:3.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:10.04

Trust: 1.0

vendor:iscmodel:dhcpscope:eqversion:3.0.2

Trust: 1.0

vendor:iscmodel:dhcpscope:eqversion:3.0.6

Trust: 1.0

vendor:iscmodel:dhcpscope:eqversion:3.0.1

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:6.06

Trust: 1.0

vendor:iscmodel:dhcpscope:eqversion:3.0.3

Trust: 1.0

vendor:iscmodel:dhcpscope:eqversion:3.1.3

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:9.10

Trust: 1.0

vendor:iscmodel:dhcpscope:eqversion:3.1.2

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:10.10

Trust: 1.0

vendor:iscmodel:dhcpscope:eqversion:3.0.5

Trust: 1.0

vendor:iscmodel:dhcpscope:eqversion:3.1.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:8.04

Trust: 1.0

vendor:iscmodel:dhcpscope:eqversion:3.1.1

Trust: 1.0

vendor:iscmodel:dhcpscope:eqversion:3.1-esv

Trust: 1.0

vendor:iscmodel:dhcpscope:eqversion:3.0.4

Trust: 1.0

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:fedoramodel: - scope: - version: -

Trust: 0.8

vendor:internet consortiummodel: - scope: - version: -

Trust: 0.8

vendor:mandriva s amodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:slackware linuxmodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

vendor:iscmodel:dhcpscope:ltversion:3.1-esv-r1 earlier

Trust: 0.8

vendor:iscmodel:dhcpscope:ltversion:4.1-esv-r2 earlier

Trust: 0.8

vendor:iscmodel:dhcpscope:ltversion:4.2.1-p1 earlier

Trust: 0.8

vendor:vmwaremodel:esxscope:eqversion:3.0.3

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:2.0 ( extended maintenance )

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:3.0

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:3.0 (x64)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:10 ( extended maintenance )

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:10 (x64) ( extended maintenance )

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:11

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:11 (x64)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4.8 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4.8 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:4.0

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:5.0 (client)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux elsscope:eqversion:3

Trust: 0.8

vendor:red hatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux long lifescope:eqversion:(v. 5.6 server)

Trust: 0.8

vendor:red hatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:rhel desktop workstationscope:eqversion:5 (client)

Trust: 0.8

vendor:applemodel:airmac base stationscope:ltversion:7.6

Trust: 0.8

vendor:applemodel:time capsulescope: - version: -

Trust: 0.8

vendor:iscmodel:dhcp client 4.0.1p1scope: - version: -

Trust: 0.3

vendor:debianmodel:linux armelscope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:aura conferencingscope:eqversion:6.0

Trust: 0.3

vendor:iscmodel:dhcpd 3.0.2rc1scope: - version: -

Trust: 0.3

vendor:iscmodel:dhcpd 4.0.1p1scope: - version: -

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:1.0

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.3

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:5.0

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.0

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:5.0

Trust: 0.3

vendor:susemodel:linux enterprise sp3scope:eqversion:10

Trust: 0.3

vendor:applemodel:time capsulescope:eqversion:7.4.2

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.0

Trust: 0.3

vendor:citrixmodel:xenserver sp2scope:eqversion:5.6

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:5.0.1

Trust: 0.3

vendor:iscmodel:dhcpd rc5scope:eqversion:3.0.1

Trust: 0.3

vendor:iscmodel:dhcp client 3.1.2p1scope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:4.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.0

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:4.0.1

Trust: 0.3

vendor:redhatmodel:enterprise linux server optionalscope:eqversion:6

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:9.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:iscmodel:dhcp client 3.1-esv-r1scope:neversion: -

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:6.06

Trust: 0.3

vendor:iscmodel:dhcpd rc6scope:eqversion:3.0.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.2

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:4.0

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:avayamodel:aura system managerscope:neversion:6.3

Trust: 0.3

vendor:avayamodel:aura conferencing sp1 standardscope:eqversion:6.0

Trust: 0.3

vendor:iscmodel:dhcpd rc4scope:eqversion:3.0

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.3

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:10.04

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:3

Trust: 0.3

vendor:iscmodel:dhcp client 4.1.1-p1scope: - version: -

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.0

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop versionscope:eqversion:4

Trust: 0.3

vendor:iscmodel:dhcp client 4.1.0p1scope: - version: -

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.2

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:8.04

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.10

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.1

Trust: 0.3

vendor:iscmodel:dhcpdscope:eqversion:4.1.1

Trust: 0.3

vendor:avayamodel:meeting exchange sp2scope:eqversion:5.2

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:8.04

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:11.0

Trust: 0.3

vendor:iscmodel:dhcpdscope:eqversion:4.1

Trust: 0.3

vendor:iscmodel:dhcpd rc1scope:eqversion:3.0.1

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:5.0

Trust: 0.3

vendor:iscmodel:dhcpd 4.0.2-p1scope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:6.06

Trust: 0.3

vendor:applemodel:time capsulescope:eqversion:7.5.2

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:4.0.2

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.2

Trust: 0.3

vendor:iscmodel:dhcpd pl2scope:eqversion:3.0

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.4

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:time capsulescope:eqversion:7.5

Trust: 0.3

vendor:applemodel:time capsulescope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux workstation optionalscope:eqversion:6

Trust: 0.3

vendor:susemodel:linux enterprise sp2scope:eqversion:10

Trust: 0.3

vendor:iscmodel:dhcpdscope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:dhcp client b1scope:eqversion:3.0

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2010.0

Trust: 0.3

vendor:applemodel:time capsulescope:eqversion:7.4.1

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:8.04

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:5.0

Trust: 0.3

vendor:iscmodel:dhcpd rc7scope:eqversion:3.0.1

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:6.06

Trust: 0.3

vendor:applemodel:airport express base station with 802.11nscope:eqversion:7.4.1

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2.8

Trust: 0.3

vendor:iscmodel:dhcpd rc11scope:eqversion:3.0.1

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.10

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:8.04

Trust: 0.3

vendor:iscmodel:dhcpdscope:eqversion:3.1.1

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.2.3

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.0

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.1

Trust: 0.3

vendor:ubuntumodel:linuxscope:eqversion:9.10

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:avayamodel:messaging storage server sp2scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:messaging storage server sp1scope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:aura system platform sp3scope:eqversion:6.0

Trust: 0.3

vendor:iscmodel:dhcpd 4.2.1-p1scope:neversion: -

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:neversion:6.1.2

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.1

Trust: 0.3

vendor:avayamodel:aura system platform sp2scope:eqversion:6.0

Trust: 0.3

vendor:iscmodel:dhcp client 4.0.2-p1scope: - version: -

Trust: 0.3

vendor:avayamodel:message networkingscope:neversion:5.2.4

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:5.5

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.10

Trust: 0.3

vendor:iscmodel:dhcpdscope:eqversion:3.0.4

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.1

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:9.10

Trust: 0.3

vendor:iscmodel:dhcp clientscope:eqversion:4.0

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:5.0.2

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.2

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:9.1

Trust: 0.3

vendor:susemodel:linux enterprise sp4scope:eqversion:10

Trust: 0.3

vendor:netbsdmodel:currentscope: - version: -

Trust: 0.3

vendor:iscmodel:dhcpd rc13scope:eqversion:3.0.1

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:6.1

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.10

Trust: 0.3

vendor:junipermodel:ctpviewscope:eqversion:7.3

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:6.06

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:susemodel:linux enterprise sp1scope:eqversion:11

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.1

Trust: 0.3

vendor:applemodel:time capsulescope:neversion:7.6

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop optionalscope:eqversion:6

Trust: 0.3

vendor:hpmodel:insight control for linuxscope:eqversion:7.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2010.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.2

Trust: 0.3

vendor:applemodel:airport express base station with 802.11nscope:neversion:7.6

Trust: 0.3

vendor:applemodel:airport express base station with 802.11nscope:eqversion:7.5.2

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:9.10

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:7.0

Trust: 0.3

vendor:junipermodel:ctpview 7.1r1scope: - version: -

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:iscmodel:dhcpd rc10scope:eqversion:3.0.1

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:9.10

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:iscmodel:dhcpd 4.1-esv-r2scope:neversion: -

Trust: 0.3

vendor:iscmodel:dhcpd 3.1-esv-r1scope:neversion: -

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.5

Trust: 0.3

vendor:iscmodel:dhcp client 4.2.1-p1scope:neversion: -

Trust: 0.3

vendor:netbsdmodel:beta2scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:5.0

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:9.10

Trust: 0.3

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.2

Trust: 0.3

vendor:ubuntumodel:linux lts lpiascope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:iscmodel:dhcpd b2pl9scope:eqversion:3.0

Trust: 0.3

vendor:citrixmodel:xenserver feature packscope:eqversion:5.61

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:9.10

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:ip office application serverscope:neversion:8.0

Trust: 0.3

vendor:junipermodel:ctpview 7.3r1scope:neversion: -

Trust: 0.3

vendor:s u s emodel:novell linux posscope:eqversion:9

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:9

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0.3

Trust: 0.3

vendor:iscmodel:dhcpd rc8scope:eqversion:3.0.1

Trust: 0.3

vendor:iscmodel:dhcpd pl1scope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:dhcp client b1pl14scope:eqversion:3.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.2.1

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:5.6

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:iscmodel:dhcp clientscope:eqversion:4.1

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:5.2

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:5.0

Trust: 0.3

vendor:iscmodel:dhcpd 4.1.1-p1scope: - version: -

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:4.0

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:iscmodel:dhcpd rc2scope:eqversion:3.0.1

Trust: 0.3

vendor:iscmodel:dhcp client b1pl17scope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:dhcpd rc9scope:eqversion:3.0.1

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:5.1

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:iscmodel:dhcp clientscope:eqversion:3.0

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:messaging storage server sp1scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:6.0

Trust: 0.3

vendor:citrixmodel:xenserver common criteriascope:eqversion:5.6

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.1

Trust: 0.3

vendor:avayamodel:aura conferencing standardscope:eqversion:6.0

Trust: 0.3

vendor:iscmodel:dhcp client 4.1-esv-r2scope:neversion: -

Trust: 0.3

vendor:avayamodel:aura system manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:pardusmodel:linuxscope:eqversion:20090

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.2

Trust: 0.3

vendor:iscmodel:dhcpd rc14scope:eqversion:3.0.1

Trust: 0.3

vendor:iscmodel:dhcpd rc12scope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:dhcpd 3.0.5b1scope: - version: -

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:5.0

Trust: 0.3

vendor:iscmodel:dhcpd rc3scope:eqversion:3.0.1

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2010.0

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:messaging storage server sp3scope:eqversion:5.2

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2.2

Trust: 0.3

vendor:iscmodel:dhcpd rc12scope:eqversion:3.0.1

Trust: 0.3

vendor:iscmodel:dhcpd rc4scope:eqversion:3.0.1

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:iscmodel:dhcpd b2pl23scope:eqversion:3.0

Trust: 0.3

vendor:citrixmodel:xenserver updatescope:eqversion:5.03

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.0

Trust: 0.3

vendor:junipermodel:ctpview 7.1r3scope:neversion: -

Trust: 0.3

vendor:junipermodel:ctpview 7.1r2scope: - version: -

Trust: 0.3

vendor:iscmodel:dhcpdscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:5.0

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:9.10

Trust: 0.3

vendor:netbsdmodel:rc3scope:eqversion:5.0

Trust: 0.3

vendor:netbsdmodel:4,0 betascope: - version: -

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:messaging storage server sp2scope:eqversion:5.1

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.1

Trust: 0.3

vendor:slackwaremodel:linux x86 64 -currentscope: - version: -

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2010.1

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:5.0

Trust: 0.3

sources: CERT/CC: VU#107886 // BID: 47176 // CNNVD: CNNVD-201104-043 // JVNDB: JVNDB-2011-001456 // JVNDB: JVNDB-2011-003066 // NVD: CVE-2011-0997

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2011-0997
value: HIGH

Trust: 1.6

nvd@nist.gov: CVE-2011-0997
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#107886
value: 11.34

Trust: 0.8

CNNVD: CNNVD-201104-043
value: HIGH

Trust: 0.6

VULMON: CVE-2011-0997
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-0997
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.7

sources: CERT/CC: VU#107886 // VULMON: CVE-2011-0997 // CNNVD: CNNVD-201104-043 // JVNDB: JVNDB-2011-001456 // JVNDB: JVNDB-2011-003066 // NVD: CVE-2011-0997

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 2.6

sources: JVNDB: JVNDB-2011-001456 // JVNDB: JVNDB-2011-003066 // NVD: CVE-2011-0997

THREAT TYPE

remote

Trust: 0.9

sources: PACKETSTORM: 100277 // PACKETSTORM: 119354 // PACKETSTORM: 106987 // CNNVD: CNNVD-201104-043

TYPE

Input Validation Error

Trust: 0.9

sources: BID: 47176 // CNNVD: CNNVD-201104-043

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-001456

PATCH

title:Internet Systems Consortiumurl:https://www.isc.org

Trust: 0.8

title:dhcp-3.1-ESV-R1-RELNOTESurl:http://ftp.isc.org/isc/dhcp/dhcp-3.1-ESV-R1-RELNOTES

Trust: 0.8

title:dhcp-4.1-ESV-R2-RELNOTESurl:http://ftp.isc.org/isc/dhcp/dhcp-4.1-ESV-R2-RELNOTES

Trust: 0.8

title:dhcp-4.2.1-P1-RELNOTESurl:http://ftp.isc.org/isc/dhcp/dhcp-4.2.1-P1-RELNOTES

Trust: 0.8

title:CVE-2011-0997: dhclient Does Not Strip or Escape Shell Meta-charactersurl:https://www.isc.org/software/dhcp/advisories/cve-2011-0997

Trust: 0.8

title:RHSA-2011:0428url:https://rhn.redhat.com/errata/RHSA-2011-0428.html

Trust: 0.8

title:RHSA-2011:0840url:https://rhn.redhat.com/errata/RHSA-2011-0840.html

Trust: 0.8

title:TLSA-2011-16url:http://www.turbolinux.co.jp/security/2011/TLSA-2011-16j.txt

Trust: 0.8

title:VMSA-2011-0010url:http://www.vmware.com/security/advisories/VMSA-2011-0010.html

Trust: 0.8

title:HT5005url:http://support.apple.com/kb/HT5005

Trust: 0.8

title:ISC DHCP dhclient Response processing shell Measures to fix meta-character code execution vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=113225

Trust: 0.6

title:Debian CVElist Bug Report Logs: isc-dhcp-client: CVE-2011-0997url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=a3bf1099a3f6410da5cb17491cb28710

Trust: 0.1

title:Ubuntu Security Notice: dhcp3 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1108-2

Trust: 0.1

title:Ubuntu Security Notice: dhcp3 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1108-1

Trust: 0.1

title:Debian Security Advisories: DSA-2216-1 isc-dhcp -- missing input sanitizationurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=9079594e67dfba2ce5fd90c652ce64af

Trust: 0.1

title:Debian CVElist Bug Report Logs: CVE-2011-2716 udhcpc insufficient checking of DHCP optionsurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=d937c5addcd54815f7f0480b4b3a55e2

Trust: 0.1

title:VMware Security Advisories: VMware ESX third party updates for Service Console packages glibc and dhcpurl:https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories&qid=386db0c9014e75eeed9029418ea6714f

Trust: 0.1

title:Citrix Security Bulletins: Archive: Citrix XenServer Multiple Security Updatesurl:https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=30a988053a9b9c888e66371d7b3040f2

Trust: 0.1

title:Threatposturl:https://threatpost.com/critical-rce-bug-avaya-voip-phones/147122/

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/security/avaya-voip-phones-harbored-10-year-old-vulnerability/

Trust: 0.1

sources: VULMON: CVE-2011-0997 // CNNVD: CNNVD-201104-043 // JVNDB: JVNDB-2011-001456 // JVNDB: JVNDB-2011-003066

EXTERNAL IDS

db:CERT/CCid:VU#107886

Trust: 4.4

db:NVDid:CVE-2011-0997

Trust: 4.1

db:BIDid:47176

Trust: 2.8

db:VUPENid:ADV-2011-0879

Trust: 2.5

db:SECUNIAid:44127

Trust: 2.5

db:SECUNIAid:44037

Trust: 2.5

db:SECTRACKid:1025300

Trust: 2.5

db:OSVDBid:71493

Trust: 2.5

db:JUNIPERid:JSA10761

Trust: 2.0

db:VUPENid:ADV-2011-1000

Trust: 1.7

db:VUPENid:ADV-2011-0909

Trust: 1.7

db:VUPENid:ADV-2011-0915

Trust: 1.7

db:VUPENid:ADV-2011-0926

Trust: 1.7

db:VUPENid:ADV-2011-0965

Trust: 1.7

db:VUPENid:ADV-2011-0886

Trust: 1.7

db:SECUNIAid:44103

Trust: 1.7

db:SECUNIAid:44048

Trust: 1.7

db:SECUNIAid:44180

Trust: 1.7

db:SECUNIAid:44089

Trust: 1.7

db:SECUNIAid:44090

Trust: 1.7

db:EXPLOIT-DBid:37623

Trust: 1.7

db:XFid:66580

Trust: 0.8

db:JVNDBid:JVNDB-2011-001456

Trust: 0.8

db:JVNDBid:JVNDB-2011-003066

Trust: 0.8

db:CNNVDid:CNNVD-201104-043

Trust: 0.6

db:VULMONid:CVE-2011-0997

Trust: 0.1

db:PACKETSTORMid:100277

Trust: 0.1

db:PACKETSTORMid:119354

Trust: 0.1

db:PACKETSTORMid:111029

Trust: 0.1

db:PACKETSTORMid:106987

Trust: 0.1

db:PACKETSTORMid:100274

Trust: 0.1

sources: CERT/CC: VU#107886 // VULMON: CVE-2011-0997 // BID: 47176 // PACKETSTORM: 100277 // PACKETSTORM: 119354 // PACKETSTORM: 111029 // PACKETSTORM: 106987 // PACKETSTORM: 100274 // CNNVD: CNNVD-201104-043 // JVNDB: JVNDB-2011-001456 // JVNDB: JVNDB-2011-003066 // NVD: CVE-2011-0997

REFERENCES

url:http://www.kb.cert.org/vuls/id/107886

Trust: 3.7

url:http://secunia.com/advisories/44037

Trust: 2.5

url:http://secunia.com/advisories/44127

Trust: 2.5

url:http://securitytracker.com/id?1025300

Trust: 2.5

url:http://www.securityfocus.com/bid/47176

Trust: 2.5

url:http://www.vupen.com/english/advisories/2011/0879

Trust: 2.5

url:https://www.isc.org/software/dhcp/advisories/cve-2011-0997

Trust: 2.1

url:http://security.gentoo.org/glsa/glsa-201301-06.xml

Trust: 1.8

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10761

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2011-april/057888.html

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2011-april/058279.html

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=133226187115472&w=2

Trust: 1.7

url:http://secunia.com/advisories/44048

Trust: 1.7

url:http://secunia.com/advisories/44089

Trust: 1.7

url:http://secunia.com/advisories/44090

Trust: 1.7

url:http://secunia.com/advisories/44103

Trust: 1.7

url:http://secunia.com/advisories/44180

Trust: 1.7

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593345

Trust: 1.7

url:http://www.debian.org/security/2011/dsa-2216

Trust: 1.7

url:http://www.debian.org/security/2011/dsa-2217

Trust: 1.7

url:http://www.mandriva.com/security/advisories?name=mdvsa-2011:073

Trust: 1.7

url:http://www.osvdb.org/71493

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2011-0428.html

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2011-0840.html

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-1108-1

Trust: 1.7

url:http://www.vupen.com/english/advisories/2011/0886

Trust: 1.7

url:http://www.vupen.com/english/advisories/2011/0909

Trust: 1.7

url:http://www.vupen.com/english/advisories/2011/0915

Trust: 1.7

url:http://www.vupen.com/english/advisories/2011/0926

Trust: 1.7

url:http://www.vupen.com/english/advisories/2011/0965

Trust: 1.7

url:http://www.vupen.com/english/advisories/2011/1000

Trust: 1.7

url:https://bugzilla.redhat.com/show_bug.cgi?id=689832

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/66580

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a12812

Trust: 1.7

url:https://www.exploit-db.com/exploits/37623/

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0997

Trust: 1.7

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0997

Trust: 1.6

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/66580

Trust: 0.8

url:http://jvn.jp/cert/jvnvu107886

Trust: 0.8

url:http://osvdb.org/71493

Trust: 0.8

url:https://jvn.jp/cert/jvnvu107886/

Trust: 0.8

url:https://jvn.jp/cert/jvnvu309451/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2011-0997

Trust: 0.5

url:http://lists.apple.com/archives/security-announce/2011/nov/msg00002.html

Trust: 0.3

url:https://www.isc.org/software/dhcp

Trust: 0.3

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10761&cat=sirt_1&actp=list

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100143367

Trust: 0.3

url:http://support.citrix.com/article/ctx130325

Trust: 0.3

url:http://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2011-005.txt.asc

Trust: 0.3

url:http://lists.vmware.com/pipermail/security-announce/2011/000142.html

Trust: 0.3

url:http://secunia.com/

Trust: 0.2

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621099

Trust: 0.1

url:https://www.rapid7.com/db/vulnerabilities/linuxrpm-rhsa-2011-0428

Trust: 0.1

url:https://usn.ubuntu.com/1108-2/

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://www.mandriva.com/security/

Trust: 0.1

url:http://store.mandriva.com/product_info.php?cpath=149&amp;products_id=490

Trust: 0.1

url:http://ftp.isc.org/isc/dhcp/dhcp-4.1.2-p1-relnotes

Trust: 0.1

url:http://www.mandriva.com/security/advisories

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2748

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0997

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3955

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3571

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3954

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4539

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3570

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4868

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3954

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4539

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2749

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2749

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3570

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3955

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3571

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2748

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4868

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3207

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3210

Trust: 0.1

url:http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.1

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.1

url:https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c02964430

Trust: 0.1

url:http://h18004.www1.hp.com/products/servers/management/insightcontrol_linux2/index.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0762

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1097

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4645

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:http://www.apple.com/support/downloads/

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

sources: CERT/CC: VU#107886 // VULMON: CVE-2011-0997 // BID: 47176 // PACKETSTORM: 100277 // PACKETSTORM: 119354 // PACKETSTORM: 111029 // PACKETSTORM: 106987 // PACKETSTORM: 100274 // CNNVD: CNNVD-201104-043 // JVNDB: JVNDB-2011-001456 // JVNDB: JVNDB-2011-003066 // NVD: CVE-2011-0997

CREDITS

Sebastian Krahmer and Marius Tomaschewski from the SUSE Security Team

Trust: 0.3

sources: BID: 47176

SOURCES

db:CERT/CCid:VU#107886
db:VULMONid:CVE-2011-0997
db:BIDid:47176
db:PACKETSTORMid:100277
db:PACKETSTORMid:119354
db:PACKETSTORMid:111029
db:PACKETSTORMid:106987
db:PACKETSTORMid:100274
db:CNNVDid:CNNVD-201104-043
db:JVNDBid:JVNDB-2011-001456
db:JVNDBid:JVNDB-2011-003066
db:NVDid:CVE-2011-0997

LAST UPDATE DATE

2026-01-31T22:08:23.225000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#107886date:2011-05-06T00:00:00
db:VULMONid:CVE-2011-0997date:2020-04-01T00:00:00
db:BIDid:47176date:2016-10-26T09:06:00
db:CNNVDid:CNNVD-201104-043date:2020-04-03T00:00:00
db:JVNDBid:JVNDB-2011-001456date:2011-08-11T00:00:00
db:JVNDBid:JVNDB-2011-003066date:2011-11-28T00:00:00
db:NVDid:CVE-2011-0997date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CERT/CCid:VU#107886date:2011-04-05T00:00:00
db:VULMONid:CVE-2011-0997date:2011-04-08T00:00:00
db:BIDid:47176date:2011-04-05T00:00:00
db:PACKETSTORMid:100277date:2011-04-11T15:09:06
db:PACKETSTORMid:119354date:2013-01-09T02:26:37
db:PACKETSTORMid:111029date:2012-03-21T01:19:12
db:PACKETSTORMid:106987date:2011-11-15T05:14:36
db:PACKETSTORMid:100274date:2011-04-11T14:46:07
db:CNNVDid:CNNVD-201104-043date:2011-04-11T00:00:00
db:JVNDBid:JVNDB-2011-001456date:2011-04-28T00:00:00
db:JVNDBid:JVNDB-2011-003066date:2011-11-28T00:00:00
db:NVDid:CVE-2011-0997date:2011-04-08T15:17:27.387