fw_dbus.py in system-config-firewall 1.2.29 and earlier uses the pickle Python module unsafely during D-Bus communication between the GUI and the backend, which might allow local users to gain privileges via a crafted serialized object.
References
Link | Resource |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063314.html | Mailing List |
http://secunia.com/advisories/45294 | Not Applicable |
http://securitytracker.com/id?1025793 | Broken Link |
http://www.openwall.com/lists/oss-security/2011/07/18/6 | Mailing List |
http://www.redhat.com/support/errata/RHSA-2011-0953.html | Not Applicable |
http://www.securityfocus.com/bid/48715 | Broken Link |
https://bugzilla.redhat.com/show_bug.cgi?id=717985 | Issue Tracking |
https://exchange.xforce.ibmcloud.com/vulnerabilities/68734 | Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2011-07-21T23:00:00
Updated: 2017-08-28T12:57:01
Reserved: 2011-06-15T00:00:00
Link: CVE-2011-2520
JSON object: View
NVD Information
Status : Analyzed
Published: 2011-07-21T23:55:03.410
Modified: 2024-01-21T02:53:02.820
Link: CVE-2011-2520
JSON object: View
Redhat Information
No data.
CWE