Описание
fw_dbus.py in system-config-firewall 1.2.29 and earlier uses the pickle Python module unsafely during D-Bus communication between the GUI and the backend, which might allow local users to gain privileges via a crafted serialized object.
fw_dbus.py in system-config-firewall 1.2.29 and earlier uses the pickle Python module unsafely during D-Bus communication between the GUI and the backend, which might allow local users to gain privileges via a crafted serialized object.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2011-2520
- https://access.redhat.com/errata/RHSA-2011:0953
- https://access.redhat.com/security/cve/CVE-2011-2520
- https://bugzilla.redhat.com/show_bug.cgi?id=717985
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68734
- http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063314.html
- http://secunia.com/advisories/45294
- http://securitytracker.com/id?1025793
- http://www.openwall.com/lists/oss-security/2011/07/18/6
- http://www.redhat.com/support/errata/RHSA-2011-0953.html
- http://www.securityfocus.com/bid/48715
Связанные уязвимости
fw_dbus.py in system-config-firewall 1.2.29 and earlier uses the pickle Python module unsafely during D-Bus communication between the GUI and the backend, which might allow local users to gain privileges via a crafted serialized object.
fw_dbus.py in system-config-firewall 1.2.29 and earlier uses the pickle Python module unsafely during D-Bus communication between the GUI and the backend, which might allow local users to gain privileges via a crafted serialized object.
fw_dbus.py in system-config-firewall 1.2.29 and earlier uses the pickle Python module unsafely during D-Bus communication between the GUI and the backend, which might allow local users to gain privileges via a crafted serialized object.
ELSA-2011-0953: system-config-firewall security update (MODERATE)
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации