{"id":"CVE-2011-1930","details":"In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.","modified":"2026-04-10T03:41:48.669833Z","published":"2019-11-14T03:15:10Z","references":[{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-201309-21.xml"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2012/05/22/12"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/47924"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/cve-2011-1930"},{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2011-1930"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2012/05/22/12"},{"type":"WEB","url":"https://access.redhat.com/security/cve/cve-2011-1930"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}