{"id":"CVE-2011-0997","details":"dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.","modified":"2026-01-27T04:10:40.546057Z","published":"2011-04-08T15:17:27Z","withdrawn":"2026-01-27T04:10:40.546057Z","related":["openSUSE-SU-2024:10358-1"],"references":[{"type":"ADVISORY","url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761"},{"type":"ARTICLE","url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html"},{"type":"ARTICLE","url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html"},{"type":"ARTICLE","url":"http://marc.info/?l=bugtraq&m=133226187115472&w=2"},{"type":"ADVISORY","url":"http://secunia.com/advisories/44037"},{"type":"ADVISORY","url":"http://secunia.com/advisories/44048"},{"type":"ADVISORY","url":"http://secunia.com/advisories/44089"},{"type":"ADVISORY","url":"http://secunia.com/advisories/44090"},{"type":"ADVISORY","url":"http://secunia.com/advisories/44103"},{"type":"ADVISORY","url":"http://secunia.com/advisories/44127"},{"type":"ADVISORY","url":"http://secunia.com/advisories/44180"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-201301-06.xml"},{"type":"ADVISORY","url":"http://securitytracker.com/id?1025300"},{"type":"ADVISORY","url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593345"},{"type":"ADVISORY","url":"http://www.debian.org/security/2011/dsa-2216"},{"type":"ADVISORY","url":"http://www.debian.org/security/2011/dsa-2217"},{"type":"WEB","url":"http://www.kb.cert.org/vuls/id/107886"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:073"},{"type":"ADVISORY","url":"http://www.redhat.com/support/errata/RHSA-2011-0428.html"},{"type":"ADVISORY","url":"http://www.redhat.com/support/errata/RHSA-2011-0840.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/47176"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-1108-1"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=689832"},{"type":"ADVISORY","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66580"},{"type":"ADVISORY","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812"},{"type":"ADVISORY","url":"https://www.exploit-db.com/exploits/37623/"},{"type":"FIX","url":"https://www.isc.org/software/dhcp/advisories/cve-2011-0997"},{"type":"REPORT","url":"http://www.vupen.com/english/advisories/2011/0879"},{"type":"REPORT","url":"http://www.vupen.com/english/advisories/2011/0886"},{"type":"REPORT","url":"http://www.vupen.com/english/advisories/2011/0909"},{"type":"REPORT","url":"http://www.vupen.com/english/advisories/2011/0915"},{"type":"REPORT","url":"http://www.vupen.com/english/advisories/2011/0926"},{"type":"REPORT","url":"http://www.vupen.com/english/advisories/2011/0965"},{"type":"REPORT","url":"http://www.vupen.com/english/advisories/2011/1000"},{"type":"WEB","url":"http://www.osvdb.org/71493"}],"schema_version":"1.7.3"}