First published: Thu Jun 30 2011(Updated: )
fw_dbus.py in system-config-firewall 1.2.29 and earlier uses the pickle Python module unsafely during D-Bus communication between the GUI and the backend, which might allow local users to gain privileges via a crafted serialized object.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat system-config-firewall | <=1.2.29 | |
Red Hat system-config-firewall | =1.2.11 | |
Red Hat system-config-firewall | =1.2.12 | |
Red Hat system-config-firewall | =1.2.14 | |
Red Hat system-config-firewall | =1.2.15 | |
Red Hat system-config-firewall | =1.2.16 | |
Red Hat system-config-firewall | =1.2.17 | |
Red Hat system-config-firewall | =1.2.21 | |
Red Hat system-config-firewall | =1.2.22 | |
Red Hat system-config-firewall | =1.2.23 | |
Red Hat system-config-firewall | =1.2.24 | |
Red Hat system-config-firewall | =1.2.25 | |
Red Hat system-config-firewall | =1.2.26 | |
Red Hat system-config-firewall | =1.2.27 | |
Red Hat system-config-firewall | =1.2.28 | |
Fedora | =15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2520 is classified as a medium severity vulnerability due to possible privilege escalation by local users.
To fix CVE-2011-2520, upgrade system-config-firewall to version 1.2.30 or later, where the vulnerability has been addressed.
CVE-2011-2520 affects system-config-firewall versions 1.2.29 and earlier, as well as Fedora 15.
CVE-2011-2520 is a privilege escalation vulnerability arising from unsafe use of the pickle Python module during D-Bus communication.
CVE-2011-2520 is not remotely exploitable; it requires local access to the affected system.