Sicherheit: Ausführen beliebiger Kommandos in wicd
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in wicd
ID: FEDORA-2012-5858
Distribution: Fedora
Plattformen: Fedora 17
Datum: Di, 24. April 2012, 08:08
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2095
Applikationen: wicd


Name        : wicd
Product : Fedora 17
Version :
Release : 1.fc17
URL : http://wicd.sourceforge.net/
Summary : Wireless and wired network connection manager
Description :
Wicd is designed to give the user as much control over behavior of network
connections as possible. Every network, both wired and wireless, has its
own profile with its own configuration options and connection behavior.
Wicd will try to automatically connect only to networks the user specifies
it should try, with a preference first to a wired network, then to wireless.

This package provides the architecture-dependent components of wicd.

Update Information:

This update fixes CVE-2012-2095. The wicd daemon suffered from a local
privilege escalation flaw due to incomplete input sanitization. A local attacker sould use this to inject arbitrary code through the D-Bus interface.

[ 1 ] Bug #811762 - CVE-2012-2095 wicd: broken filtering leads to arbitrary
code execution

This update can be installed with the "yum" update program. Use
su -c 'yum update wicd' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list
Pro-Linux @Facebook
Neue Nachrichten