[arch-security] [ASA-201601-30] blueman: privilege escalation
Remi Gacogne
rgacogne at archlinux.org
Mon Jan 25 22:17:02 UTC 2016
Arch Linux Security Advisory ASA-201601-30
==========================================
Severity: Medium
Date : 2016-01-25
CVE-ID : CVE-2015-8612
Package : blueman
Type : privilege escalation
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
Summary
=======
The package blueman before version 2.0.3-1 is vulnerable to local
privilege escalation.
Resolution
==========
Upgrade to 2.0.3-1.
# pacman -Syu "blueman>=2.0.3-1"
The problem has been fixed upstream in version 2.0.3.
Workaround
==========
None.
Description
===========
A local privilege escalation vulnerability has been found in the
Network::EnableNetwork() method of blueman. An unsanitized string is
received over DBUS into the dhcp_handler parameter and passed to eval(),
thus allowing arbitrary command execution with the privileges of the
user running blueman.
Impact
======
A local attacker can use this vulnerability to get root access on the
affected host.
References
==========
https://bugs.archlinux.org/task/47784
https://access.redhat.com/security/cve/CVE-2015-8612
https://github.com/blueman-project/blueman/issues/416
https://github.com/blueman-project/blueman/commit/e3d249391654da3fefe08b5389c2030fff1b12ea
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20160125/c5e97ec1/attachment-0001.asc>
More information about the arch-security
mailing list