First published: Mon Apr 07 2014(Updated: )
The SetWiredProperty function in the D-Bus interface in WICD before 1.7.2 allows local users to write arbitrary configuration settings and gain privileges via a crafted property name in a dbus message.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
WICD | <=1.7.1 | |
WICD | =1.2.7 | |
WICD | =1.3.1 | |
WICD | =1.4.0 | |
WICD | =1.4.1 | |
WICD | =1.4.2 | |
WICD | =1.5.0 | |
WICD | =1.5.1 | |
WICD | =1.5.2 | |
WICD | =1.5.3 | |
WICD | =1.5.4 | |
WICD | =1.5.5 | |
WICD | =1.5.6 | |
WICD | =1.5.7 | |
WICD | =1.5.8 | |
WICD | =1.5.9 | |
WICD | =1.6.0 | |
WICD | =1.6.2 | |
WICD | =1.7.0 | |
WICD | =1.7.1-beta3 | |
Fedora | =15 | |
Fedora | =16 | |
Fedora | =17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2095 has a moderate severity as it allows local users to write arbitrary configuration settings.
To fix CVE-2012-2095, upgrade to WICD version 1.7.2 or later, which addresses this vulnerability.
CVE-2012-2095 affects local users of WICD versions prior to 1.7.2, specifically those versions listed in the advisory.
No, CVE-2012-2095 can only be exploited by local users due to the nature of the vulnerability.
The impact of CVE-2012-2095 is that local users can gain elevated privileges through unauthorized access to configuration settings.