The DHCP vulnerability in Red Hat Linux helps hackers execute remote code
Security researchers at Google have discovered a serious remote command-line vulnerability on Red Hat Linux's DHCP software and derivative versions of the Fedora operating system.
Placed code CVE-2018-1111, this vulnerability allows an attacker to execute remote code without root privileges on the victim machine.
Whenever the computer joins the network, DHCP software will allow the machine to automatically receive network configuration parameters such as IP addresses and DNS servers from DHCP servers (Dynamic Host Control Protocol).
The vulnerability is on the NetworkManager integration script in the DHCP client packages. Felix Wilhelm from Google's security team discovered that the attacker had a malicious DHCP server or connected to the same network as the victim, which could be exploited by faking DHCP responses, eventually executing the code on the machine. victim.
Update affected DHCP versions to avoid attack
The details of this vulnerability were not disclosed by him and said that the code for proving the PoC was short, including a tweet was enough. Barkın Kılıç, a researcher from Turkey, posted the PoC code on Twitter.
Red Hat confirmed that this vulnerability affects Red Hat Linux 6 and 7 and everyone who is using affected DHCP clients should update the latest version immediately.
'Users should disable or delete affected scripts, but this will prevent some configurations from being given by the DHCP server to the machine, such as the NTP address or NIS server , ' Red Hat said.
Fedora also released new HDCP versions that fix bugs for Fedora 26, 27 and 28.
Other Linux kernels such as OpenSUSE or Ubuntu are not affected by DHCP not using the NetworkManager script by default.
See more:
- Top Linux distros for newbies
- Linux operating system: A strange development path
- Some popular Linux 'distro'
You should read it
- Which is better DHCP or static IP?
- Set up DHCP server in Windows 2003
- What is DHCP error? How to overcome it?
- How to Install, Configure, and Test Windows Server 2012 R2 Single Subnet DHCP Server
- Instructions for installing DHCP Role in Windows Server 2012
- Steps to fix 'Unable to Contact your DHCP Server' error on Windows 10
- Configuration, static DHCP settings on DD-WRT router
- Transfer DHCP from Windows Server 2000 to 2008
May be interested
- Hackers start using SambaCry to attack Linux computerssupposedly the wannacry linux version, sambacry exploits the vulnerability on the samba software that will cause linux users to start worrying.
- What is VENOM Vulnerability? How can you protect yourself?the venom vulnerability affects all major cpu vendors, including intel, amd, and arm. venom allows malicious actors to read the contents of a computer's memory and potentially execute code remotely.
- Hundreds of HP printer models contain vulnerabilities that allow remote code execution attackshp has issued security alerts for three critical vulnerabilities affecting hundreds of laserjet pro, pagewide pro, officejet, enterprise, large format, and deskjet printer models.
- Samba vulnerabilities allow hackers to invade thousands of remote Linux computersa 7-year-old vulnerability was found on samba software, allowing an attacker to hack and control linux and unix computers remotely.
- How to disable DHCP in Windows 10if you are running a regular home network, devices get their ip addresses through the dynamic host configuration protocol (dhcp).
- New privilege escalation vulnerability called 'Dirty Pipe' is threatening all Linux distrosrecently, security researcher max kellermann shared about a security flaw called 'dirty pipe'. it affects linux kernel 5.8 and above and even android devices.
- Microsoft has patched the critical vulnerability on Android Remote Desktop applicationthis vulnerability is currently monitored with cve-2019-1108 identifiers, and dangerous ratings at 'important'.
- Log4Shell zero-day vulnerability discovered, the new nightmare of enterpriseshow to exploit a critical zero-day vulnerability in the java-based apache log4j logging library has just been posted on the internet. this leaves users and businesses as well as organizations vulnerable to remote code execution attacks.
- Adobe Flash Player has a serious zero-day vulnerabilityrecently, another zero-day vulnerability was discovered by south korea's cert in adobe flash player to allow remote code execution (rce), remote code execution behavior on different platforms.
- Discovered a new zero-day vulnerability on macOS that allows attackers to run commands remotelyan international team of security researchers has publicly disclosed a new vulnerability that exists in apple's macos finder.