FKIE_CVE-2012-2095

Vulnerability from fkie_nvd - Published: 2014-04-07 15:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
The SetWiredProperty function in the D-Bus interface in WICD before 1.7.2 allows local users to write arbitrary configuration settings and gain privileges via a crafted property name in a dbus message.
References
secalert@redhat.comhttp://bazaar.launchpad.net/~wicd-devel/wicd/experimental/revision/751
secalert@redhat.comhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668397
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-April/079025.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-April/079029.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-April/079055.html
secalert@redhat.comhttp://secunia.com/advisories/48759Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/49657Vendor Advisory
secalert@redhat.comhttp://www.exploit-db.com/exploits/18733Exploit
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-201206-08.xml
secalert@redhat.comhttp://www.infosecinstitute.com/courses/ethical-hacking-wicd-0day.html
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/04/11/2
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/04/11/3
secalert@redhat.comhttp://www.securityfocus.com/bid/52987
secalert@redhat.comhttps://bugs.launchpad.net/wicd/+bug/979221
secalert@redhat.comhttps://launchpad.net/wicd/+announcement/9888
af854a3a-2127-422b-91ae-364da2661108http://bazaar.launchpad.net/~wicd-devel/wicd/experimental/revision/751
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668397
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079025.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079029.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079055.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48759Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49657Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.exploit-db.com/exploits/18733Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-201206-08.xml
af854a3a-2127-422b-91ae-364da2661108http://www.infosecinstitute.com/courses/ethical-hacking-wicd-0day.html
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/04/11/2
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/04/11/3
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/52987
af854a3a-2127-422b-91ae-364da2661108https://bugs.launchpad.net/wicd/+bug/979221
af854a3a-2127-422b-91ae-364da2661108https://launchpad.net/wicd/+announcement/9888

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:david_paleino:wicd:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2601C49-6803-49E1-8A1B-4314900CCB67",
              "versionEndIncluding": "1.7.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_paleino:wicd:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "06AFC460-E683-4047-8C2A-1E9AC377917B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_paleino:wicd:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D411ED-67BF-45A0-BE8A-E981CAB0F4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_paleino:wicd:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "45632B83-B5C7-42AC-9B8B-031AB0D6417A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_paleino:wicd:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "52DCBA8B-FD94-4184-985A-E054DEC04671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_paleino:wicd:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F48E42D-AEEA-41EC-BCFB-5581CEA05B58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_paleino:wicd:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "288E7A59-D1BA-45D7-A30A-9F5F56E5A192",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_paleino:wicd:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2265EFEA-CEF9-42E0-A538-8D8FAE5F351C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_paleino:wicd:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7769F3E0-EF1A-480C-845E-7178F2939ECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_paleino:wicd:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "22A39899-C5D7-47D0-9B9C-6ADD1F756B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_paleino:wicd:1.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "27ED667E-BD1E-4352-A5F0-DB70B86D600D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_paleino:wicd:1.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "84B74048-746F-4DF7-913D-3F0163FC8FD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_paleino:wicd:1.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9E268AD-D2A5-48DD-A311-6C2CD8A67149",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_paleino:wicd:1.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FE6B55-58EA-403E-AA60-2079A559D2CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_paleino:wicd:1.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D05918F4-2957-459D-9505-1B14B7C4D257",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_paleino:wicd:1.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7BD785-94DC-4525-9CA4-9DE41F316807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_paleino:wicd:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FCF612E-89BE-4AFC-8DC3-D8DE1452BFAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_paleino:wicd:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DF97412-C3F2-4AE2-B2CE-CE8F24EC139F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_paleino:wicd:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "40BD3EF9-EE76-4E63-B057-4B369BB39568",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:david_paleino:wicd:1.7.1:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "1218FF25-BA69-4649-9602-9424E5F6AEBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*",
              "matchCriteriaId": "9396E005-22D8-4342-9323-C7DEA379191D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*",
              "matchCriteriaId": "706C6399-CAD1-46E3-87A2-8DFE2CF497ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DA9D861-3EAF-42F5-B0B6-A4CD7BDD6188",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SetWiredProperty function in the D-Bus interface in WICD before 1.7.2 allows local users to write arbitrary configuration settings and gain privileges via a crafted property name in a dbus message."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n SetWiredProperty en la interfaz D-Bus en WICD anterior a 1.7.2 permite a usuarios locales escribir ajustes de configuraci\u00f3n arbitrarios y ganar privilegios a trav\u00e9s de un nombre de propiedad manipulado en un mensaje dbus."
    }
  ],
  "id": "CVE-2012-2095",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-04-07T15:55:04.077",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://bazaar.launchpad.net/~wicd-devel/wicd/experimental/revision/751"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668397"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079025.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079029.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079055.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48759"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49657"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/18733"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201206-08.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.infosecinstitute.com/courses/ethical-hacking-wicd-0day.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/04/11/2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/04/11/3"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/52987"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugs.launchpad.net/wicd/+bug/979221"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://launchpad.net/wicd/+announcement/9888"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bazaar.launchpad.net/~wicd-devel/wicd/experimental/revision/751"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668397"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079025.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079029.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079055.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48759"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49657"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/18733"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201206-08.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.infosecinstitute.com/courses/ethical-hacking-wicd-0day.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/04/11/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/04/11/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/52987"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugs.launchpad.net/wicd/+bug/979221"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://launchpad.net/wicd/+announcement/9888"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…