CVE-2011-2520

fw_dbus.py in system-config-firewall 1.2.29 and earlier uses the pickle Python module unsafely during D-Bus communication between the GUI and the backend, which might allow local users to gain privileges via a crafted serialized object.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:system-config-firewall:1.2.23:*:*:*:*:*:*:*
cpe:2.3:a:redhat:system-config-firewall:1.2.22:*:*:*:*:*:*:*
cpe:2.3:a:redhat:system-config-firewall:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:system-config-firewall:1.2.25:*:*:*:*:*:*:*
cpe:2.3:a:redhat:system-config-firewall:1.2.24:*:*:*:*:*:*:*
cpe:2.3:a:redhat:system-config-firewall:1.2.27:*:*:*:*:*:*:*
cpe:2.3:a:redhat:system-config-firewall:1.2.26:*:*:*:*:*:*:*
cpe:2.3:a:redhat:system-config-firewall:1.2.16:*:*:*:*:*:*:*
cpe:2.3:a:redhat:system-config-firewall:1.2.15:*:*:*:*:*:*:*
cpe:2.3:a:redhat:system-config-firewall:1.2.14:*:*:*:*:*:*:*
cpe:2.3:a:redhat:system-config-firewall:1.2.12:*:*:*:*:*:*:*
cpe:2.3:a:redhat:system-config-firewall:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:system-config-firewall:1.2.28:*:*:*:*:*:*:*
cpe:2.3:a:redhat:system-config-firewall:1.2.21:*:*:*:*:*:*:*
cpe:2.3:a:redhat:system-config-firewall:1.2.17:*:*:*:*:*:*:*

Information

Published : 2011-07-21 23:55

Updated : 2017-08-29 01:29


NVD link : CVE-2011-2520

Mitre link : CVE-2011-2520


JSON object : View

Products Affected

redhat

  • system-config-firewall
CWE
CWE-264

Permissions, Privileges, and Access Controls