fw_dbus.py in system-config-firewall 1.2.29 and earlier uses the pickle Python module unsafely during D-Bus communication between the GUI and the backend, which might allow local users to gain privileges via a crafted serialized object.
References
Link | Resource |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063314.html | Mailing List |
http://secunia.com/advisories/45294 | Not Applicable |
http://securitytracker.com/id?1025793 | Broken Link |
http://www.openwall.com/lists/oss-security/2011/07/18/6 | Mailing List |
http://www.redhat.com/support/errata/RHSA-2011-0953.html | Not Applicable |
http://www.securityfocus.com/bid/48715 | Broken Link |
https://bugzilla.redhat.com/show_bug.cgi?id=717985 | Issue Tracking |
https://exchange.xforce.ibmcloud.com/vulnerabilities/68734 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2011-07-21 23:55
Updated : 2024-01-21 02:53
NVD link : CVE-2011-2520
Mitre link : CVE-2011-2520
CVE.ORG link : CVE-2011-2520
JSON object : View
Products Affected
fedoraproject
- fedora
redhat
- system-config-firewall
CWE
CWE-502
Deserialization of Untrusted Data