Apple Time Capsule and AirPort Base Station (802.11n) Firmware < 7.6 (APPLE-SA-2011-11-10-2)

High Nessus Plugin ID 56855


The remote network device is affected by an arbitrary code execution vulnerability.


According to the firmware version collected via SNMP, the copy of dhclient-script included with the remote Apple Time Capsule / AirPort Express Base Station / AirPort Extreme Base Station reportedly fails to strip shell meta-characters in a hostname obtained from a DHCP response. A remote attacker might be able to leverage this vulnerability to execute arbitrary code on the affected device.


Upgrade the firmware to version 7.6 or later.

See Also

Plugin Details

Severity: High

ID: 56855

File Name: airport_firmware_7_6.nasl

Version: $Revision: 1.8 $

Type: local

Family: Misc.

Published: 2011/11/16

Modified: 2016/10/17

Dependencies: 45022

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

Required KB Items: Host/Airport/Firmware, SNMP/community

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/11/11

Vulnerability Publication Date: 2011/04/05

Exploitable With


Reference Information

CVE: CVE-2011-0997

BID: 47176

OSVDB: 71493