CVE-2012-2095
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
07/04/2014
Last modified:
12/04/2025
Description
The SetWiredProperty function in the D-Bus interface in WICD before 1.7.2 allows local users to write arbitrary configuration settings and gain privileges via a crafted property name in a dbus message.
Impact
Base Score 2.0
6.90
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:david_paleino:wicd:*:*:*:*:*:*:*:* | 1.7.1 (including) | |
| cpe:2.3:a:david_paleino:wicd:1.2.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_paleino:wicd:1.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_paleino:wicd:1.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_paleino:wicd:1.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_paleino:wicd:1.4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_paleino:wicd:1.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_paleino:wicd:1.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_paleino:wicd:1.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_paleino:wicd:1.5.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_paleino:wicd:1.5.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_paleino:wicd:1.5.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_paleino:wicd:1.5.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_paleino:wicd:1.5.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:david_paleino:wicd:1.5.8:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bazaar.launchpad.net/~wicd-devel/wicd/experimental/revision/751
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668397
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079025.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079029.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079055.html
- http://secunia.com/advisories/48759
- http://secunia.com/advisories/49657
- http://www.exploit-db.com/exploits/18733
- http://www.gentoo.org/security/en/glsa/glsa-201206-08.xml
- http://www.infosecinstitute.com/courses/ethical-hacking-wicd-0day.html
- http://www.openwall.com/lists/oss-security/2012/04/11/2
- http://www.openwall.com/lists/oss-security/2012/04/11/3
- http://www.securityfocus.com/bid/52987
- https://bugs.launchpad.net/wicd/+bug/979221
- https://launchpad.net/wicd/+announcement/9888
- http://bazaar.launchpad.net/~wicd-devel/wicd/experimental/revision/751
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668397
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079025.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079029.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079055.html
- http://secunia.com/advisories/48759
- http://secunia.com/advisories/49657
- http://www.exploit-db.com/exploits/18733
- http://www.gentoo.org/security/en/glsa/glsa-201206-08.xml
- http://www.infosecinstitute.com/courses/ethical-hacking-wicd-0day.html
- http://www.openwall.com/lists/oss-security/2012/04/11/2
- http://www.openwall.com/lists/oss-security/2012/04/11/3
- http://www.securityfocus.com/bid/52987
- https://bugs.launchpad.net/wicd/+bug/979221
- https://launchpad.net/wicd/+announcement/9888



