First published: Mon Feb 09 2009(Updated: )
The DBus configuration file for Wicd before 1.5.9 allows arbitrary users to own org.wicd.daemon, which allows local users to receive messages that were intended for the Wicd daemon, possibly including credentials.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
David Paleino Wicd | =1.4.0 | |
David Paleino Wicd | =1.2.7 | |
David Paleino Wicd | =1.5.7 | |
David Paleino Wicd | =1.5.3 | |
David Paleino Wicd | =1.4.2 | |
David Paleino Wicd | =1.5.2 | |
David Paleino Wicd | =1.5.4 | |
David Paleino Wicd | =1.3.1 | |
David Paleino Wicd | <=1.5.8 | |
David Paleino Wicd | =1.5.5 | |
David Paleino Wicd | =1.4.1 | |
David Paleino Wicd | =1.5.0 | |
David Paleino Wicd | =1.5.1 | |
David Paleino Wicd | =1.5.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0489 is classified as a medium severity vulnerability due to potential unauthorized access to sensitive messages.
To fix CVE-2009-0489, upgrade Wicd to version 1.5.9 or later where the DBus configuration has been secured.
CVE-2009-0489 affects Wicd versions prior to 1.5.9, specifically versions 1.2.7 through 1.5.8.
CVE-2009-0489 is a local privilege escalation vulnerability that allows unauthorized users to interact with the Wicd daemon.
Due to CVE-2009-0489, local users may potentially receive messages intended for the Wicd daemon, including sensitive credential information.