CVSS2
Attack Vector
LOCAL
Attack Complexity
HIGH
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:H/Au:S/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
fw_dbus.py in system-config-firewall 1.2.29 and earlier uses the pickle Python module unsafely during D-Bus communication between the GUI and the backend, which might allow local users to gain privileges via a crafted serialized object.
Vendor | Product | Version | CPE |
---|---|---|---|
redhat | system-config-firewall | * | cpe:2.3:a:redhat:system-config-firewall:*:*:*:*:*:*:*:* |
fedoraproject | fedora | 15 | cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:* |
lists.fedoraproject.org/pipermail/package-announce/2011-August/063314.html
secunia.com/advisories/45294
securitytracker.com/id?1025793
www.openwall.com/lists/oss-security/2011/07/18/6
www.redhat.com/support/errata/RHSA-2011-0953.html
www.securityfocus.com/bid/48715
bugzilla.redhat.com/show_bug.cgi?id=717985
exchange.xforce.ibmcloud.com/vulnerabilities/68734
CVSS2
Attack Vector
LOCAL
Attack Complexity
HIGH
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:H/Au:S/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%