Red Hat DHCP客户端命令执行漏洞CVE-2018-1111修复方法

漏洞详细介绍:

1.  https://access.redhat.com/errata/RHSA-2018:1458

2.  https://dynoroot.ninja/

3.  https://cert.360.cn/warning/detail?id=f075706d5a3c7efbb56efeead3d68a72

4.  https://twitter.com/_fel1x/status/996388421273882626


漏洞修复方法:

官网发布了最新的补丁,如果你的服务器可以联网那就简单了,执行以下命令即可完成修复。

#yum update dhclient 
#rpm -qa --changelog dhclient  | grep CVE-2018
     - Resolves: #1570898 - Fix CVE-2018-1111: Do not parse backslash as escape character

如果你的服务器无法上网则需要下载最新的补丁,打开

可以看到这个列表,根据自己的操作系统版本进入对应详情页面去下载补丁,这里我以Red Hat Enterprise Linux 6为例。

Platform Errata Release Date
Red Hat Enterprise Linux Advanced Update Support 6.4 (dhcp) RHSA-2018:1461 2018-05-15
Red Hat Enterprise Linux Extended Update Support 7.3 (dhcp) RHSA-2018:1456 2018-05-15
Red Hat Enterprise Linux Advanced Update Support 6.6 (dhcp) RHSA-2018:1459 2018-05-15
Red Hat Enterprise Linux 6 (dhcp) RHSA-2018:1454 2018-05-15
Red Hat Enterprise Linux Extended Update Support 6.7 (dhcp) RHSA-2018:1458 2018-05-15
Red Hat Enterprise Linux Advanced Update Support 7.2 (dhcp) RHSA-2018:1457 2018-05-15
Red Hat Enterprise Linux Server TUS (v. 6.6) (dhcp) RHSA-2018:1459 2018-05-15
Red Hat Enterprise Linux 7 (dhcp) RHSA-2018:1453 2018-05-15
Red Hat Enterprise Linux Extended Update Support 7.4 (dhcp) RHSA-2018:1455 2018-05-15
Red Hat Enterprise Linux Server Update Services for SAP Solutions 7.2 (dhcp) RHSA-2018:1457 2018-05-15
Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts (rhvm-appliance) RHSA-2018:1525 2018-05-15
Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts RHSA-2018:1524 2018-05-15
Red Hat Enterprise Linux Advanced Update Support 6.5 (dhcp) RHSA-2018:1460 2018-05-15
Red Hat Enterprise Linux Server TUS (v. 7.2) (dhcp) RHSA-2018:1457 2018-05-15

打开https://access.redhat.com/errata/RHSA-2018:1454 ,并进入Updated Packages标签页,下面会有不

同版本和32位、64位操作系统的补丁,但是红帽官网必须是正版授权才可以下载,我是去http://rpm.pbone.net/根据

官网提供的补丁包名去搜索下载的,如果你的版本和我的一样,我这里有一个已经下载好的资源。


补丁安装:

 一般情况下只需要下载dhclient和dhcp-common包即可。

1、卸载老版本
查看具体安装版本
# rpm -qa|grep dhclient
dhclient-4.1.1-25.P1.el6.x86_64
# rpm -qa|grep dhcp-common
dhcp-common-4.1.1-25.P1.el6.x86_64

卸载老版本
# rpm -e --nodeps dhclient-4.1.1-25.P1.el6.x86_64 dhcp-common-4.1.1-25.P1.el6.x86_64

再执行第一步的命令确认无结果即可
2、安装新版本
按照顺序先安装dhcp-common,再安装dhclient# rpm 按照顺序先安装dhcp-common,再安装dhclient
# rpm -ivh dhcp-common-4.1.1-53.P1.el6_9.4.x86_64.rpm

warning: dhcp-common-4.1.1-53.P1.el6_9.4.x86_64.rpm: Header V4 DSA/SHA1 Signature, key ID 192a7d7d: NOKEY
Preparing...                ########################################### [100%]
   1:dhcp-common            ########################################### [100%]

# rpm -ivh dhclient-4.1.1-53.P1.el6_9.4.x86_64.rpm
warning: dhclient-4.1.1-53.P1.el6_9.4.x86_64.rpm: Header V4 DSA/SHA1 Signature, key ID 192a7d7d: NOKEY
Preparing...                ########################################### [100%]
   1:dhclient               ########################################### [100%]

3、确认安装成功

changelog中显示最新版本中对该漏洞的修复日志

# rpm -qa --changelog dhclient  | grep CVE-2018
- Resolves: #1570897 - Fix comamnd execution in NM script (CVE-2018-1111)
- Resolves: #1550085 - CVE-2018-5733 Avoid reference overflow
- Resolves: #1550083 - CVE-2018-5732 Avoid options buffer overflow

你可能感兴趣的:(漏洞修复)