[arch-security] [ASA-201601-30] blueman: privilege escalation

Remi Gacogne rgacogne at archlinux.org
Mon Jan 25 22:17:02 UTC 2016


Arch Linux Security Advisory ASA-201601-30
==========================================

Severity: Medium
Date    : 2016-01-25
CVE-ID  : CVE-2015-8612
Package : blueman
Type    : privilege escalation
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE

Summary
=======

The package blueman before version 2.0.3-1 is vulnerable to local
privilege escalation.

Resolution
==========

Upgrade to 2.0.3-1.

# pacman -Syu "blueman>=2.0.3-1"

The problem has been fixed upstream in version 2.0.3.

Workaround
==========

None.

Description
===========

A local privilege escalation vulnerability has been found in the
Network::EnableNetwork() method of blueman. An unsanitized string is
received over DBUS into the dhcp_handler parameter and passed to eval(),
thus allowing arbitrary command execution with the privileges of the
user running blueman.

Impact
======

A local attacker can use this vulnerability to get root access on the
affected host.

References
==========

https://bugs.archlinux.org/task/47784
https://access.redhat.com/security/cve/CVE-2015-8612
https://github.com/blueman-project/blueman/issues/416
https://github.com/blueman-project/blueman/commit/e3d249391654da3fefe08b5389c2030fff1b12ea

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20160125/c5e97ec1/attachment-0001.asc>


More information about the arch-security mailing list