Advisory Published
Updated

REDHAT-BUG-546117

First published: Thu Dec 10 2009(Updated: )

+++ This bug was initially created as a clone of <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=546115">Bug #546115</a> +++ nm-connection-editor may inadvertently publish network configuration settings over D-Bus when a user changes those settings using the connection editor. D-Bus gives all clients a bus name (usually 1:XXX where XXX is an ever-increasing number) whenever the client connects to the bus. Even though this client is not exporting a /named/ service, it is still on the bus and if the client exports an object (even inadvertently, without registering a well-known bus name) signals emitted by that object will also be proxied onto the bus. nm-connection-editor inadvertently exported connection objects on the bus, and when a user changes those connections though the connection editor GUI, the editor may emit a summary of those changes onto the bus, leading to the information disclosure. 1) start 'dbus-monitor --system' in a terminal 2) run nm-connection-editor 3) edit a connection that has secrets, like a protected wifi network 4) Upon clicking the "Apply" button, check the dbus-monitor terminal window; the wifi network password may have been emitted as part of the "Updated" signal for that connection This is only a problem for NM 0.7.x present in Fedora &lt;= 11 and RHEL5. The problem has been long corrected in NM 0.8 (F12+). Upstream commit to 0.7.x fixing this problem is here: <a href="http://git.gnome.org/cgit/network-manager-applet/commit/?h=NETWORKMANAGER_APPLET_0_7&amp;id=8627880e07c8345f69ed639325280c7f62a8f894">http://git.gnome.org/cgit/network-manager-applet/commit/?h=NETWORKMANAGER_APPLET_0_7&amp;id=8627880e07c8345f69ed639325280c7f62a8f894</a>

Affected SoftwareAffected VersionHow to fix
GNOME NetworkManager<=0.7.x
GNOME NetworkManager<=11
Red Hat Enterprise Linux<=5

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this issue?

    The vulnerability ID for this issue is REDHAT-BUG-546117.

  • What version of GNOME Network Manager is affected by REDHAT-BUG-546117?

    GNOME Network Manager versions up to 0.7.x are affected by REDHAT-BUG-546117.

  • How can the issue in REDHAT-BUG-546117 be mitigated?

    The issue in REDHAT-BUG-546117 can be mitigated by keeping the Network Manager updated to the latest version.

  • What products are known to be impacted by REDHAT-BUG-546117?

    The impacted products include GNOME Network Manager, Fedora Network Manager, and Red Hat RHEL up to version 5.

  • Is there a risk of sensitive data exposure due to REDHAT-BUG-546117?

    Yes, REDHAT-BUG-546117 may inadvertently publish network configuration settings which poses a risk of sensitive data exposure.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203