Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2011-2520

Overview

Vulnerability Score 6.0 6.0
CVE Id CVE-2011-2520
Last Modified 11 Aug 2011 10:45:09
Published 21 Jul 2011 07:55:03
Confidentiality Impact COMPLETE COMPLETE
Integrity Impact COMPLETE COMPLETE
Availability Impact COMPLETE COMPLETE
Access Vector LOCAL
Access Complexity HIGH
Authentication SINGLE_INSTANCE

CVE-2011-2520

Summary

fw_dbus.py in system-config-firewall 1.2.29 and earlier uses the pickle Python module unsafely during D-Bus communication between the GUI and the backend, which might allow local users to gain privileges via a crafted serialized object.

Vulnerable Systems

Application

  • Redhat System-config-firewall 1.2.11

  • Redhat System-config-firewall 1.2.12

  • Redhat System-config-firewall 1.2.14

  • Redhat System-config-firewall 1.2.15

  • Redhat System-config-firewall 1.2.16

  • Redhat System-config-firewall 1.2.17

  • Redhat System-config-firewall 1.2.21

  • Redhat System-config-firewall 1.2.22

  • Redhat System-config-firewall 1.2.23

  • Redhat System-config-firewall 1.2.24

  • Redhat System-config-firewall 1.2.25

  • Redhat System-config-firewall 1.2.26

  • Redhat System-config-firewall 1.2.27

  • Redhat System-config-firewall 1.2.28

  • Redhat System-config-firewall 1.2.29


References

CONFIRM - https://bugzilla.redhat.com/show_bug.cgi?id=717985

MLIST - [oss-security] 20110718 CVE-2011-2520: flaw in system-config-firewall's usage of pickle allows privilege escalation

XF - systemconfigfirewall-priv-escalation(68734)

BID - 48715

REDHAT - RHSA-2011:0953

SECTRACK - 1025793

SECUNIA - 45294

FEDORA - FEDORA-2011-9652


Last Updated: 27 May 2016 10:57:02