First published: Fri Feb 27 2009(Updated: )
From Ludwid Nussel: nm-applet.conf contains the following rules: <policy context="default"> <allow send_destination="org.freedesktop.NetworkManagerUserSettings"/> <allow send_interface="org.freedesktop.NetworkManagerSettings"/> <!-- Only root can get secrets --> <deny send_interface="org.freedesktop.NetworkManagerSettings.Secrets"/> Ie anyone can call methods on destination org.freedesktop.NetworkManagerUserSettings. There is a line that is supposed to block users from calling the GetSecrets method on the separate interface for secrets. Unfortunately that interface is not called "org.freedesktop.NetworkManagerSettings.Secrets" but "org.freedesktop.NetworkManagerSettings.Connection.Secrets". So the deny statement is useless and any user on the system can fetch the connection secrets. The same problem can be found in nm-system-settings. Acknowledgements: Red Hat would like to thank Ludwig Nussel for reporting this flaw responsibly.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =7.10 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =8.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0365 is classified as a medium severity vulnerability.
To fix CVE-2009-0365, upgrade to a non-vulnerable version of Ubuntu Linux as specified in the security advisory.
CVE-2009-0365 affects Ubuntu versions 6.06, 7.10, 8.04, and 8.10.
CVE-2009-0365 does not allow for remote code execution, but it can lead to information disclosure.
The vendor responsible for addressing CVE-2009-0365 is Canonical, the company behind Ubuntu Linux.