Check Point Advisories

ISC DHCP dhclient Network Configuration Script Command Injection (CVE-2011-0997)

Check Point Reference: CPAI-2011-377
Date Published: 16 Aug 2011
Severity: Critical
Last Updated: 22 Feb 2017
Source:
Industry Reference:CVE-2011-0997
Protection Provided by:

Security Gateway
R80, R77, R76, R75

Who is Vulnerable?
Vulnerability Description A command injection vulnerability has been reported in ISC DHCP dhclient. The Dynamic Host Configuration Protocol (DHCP) protocol is used to centrally manage and automate IP addresses assignment on a network.The vulnerability is due to an input validation issue in dhclient when parsing crafted responses from a DHCP server. A remote attacker could trigger this vulnerability by sending such responses to an affected service.Successful exploitation may allow an attacker to execute commands on an affected system, in the security context of the 'root' user.

Protection Overview

This protection detects attempts to transfer malicious DHCP responses to the network.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update.For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R76 / R75

  1. In the IPS tab, click Protections and find the ISC DHCP dhclient Network Configuration Script Command Injection protection using the Search tool and Edit the protection's settings.
  2. Install policy on all modules.

This protection's log will contain the following information:

Attack Name:  DHCP Protection Violation.
Attack Information:  ISC DHCP dhclient Network Configuration Script Command Injection

This website uses cookies to ensure you get the best experience. More Info Got it, Thanks!