CVE-2009-0489
Published Feb 9, 2009
Last updated 12 years ago
Overview
- Description
- The DBus configuration file for Wicd before 1.5.9 allows arbitrary users to own org.wicd.daemon, which allows local users to receive messages that were intended for the Wicd daemon, possibly including credentials.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-16
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:david_paleino:wicd:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA9F8B78-6C51-4F0C-965E-831C81977BFE", "versionEndIncluding": "1.5.8" }, { "criteria": "cpe:2.3:a:david_paleino:wicd:1.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06AFC460-E683-4047-8C2A-1E9AC377917B" }, { "criteria": "cpe:2.3:a:david_paleino:wicd:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2D411ED-67BF-45A0-BE8A-E981CAB0F4CD" }, { "criteria": "cpe:2.3:a:david_paleino:wicd:1.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "45632B83-B5C7-42AC-9B8B-031AB0D6417A" }, { "criteria": "cpe:2.3:a:david_paleino:wicd:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52DCBA8B-FD94-4184-985A-E054DEC04671" }, { "criteria": "cpe:2.3:a:david_paleino:wicd:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F48E42D-AEEA-41EC-BCFB-5581CEA05B58" }, { "criteria": "cpe:2.3:a:david_paleino:wicd:1.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "288E7A59-D1BA-45D7-A30A-9F5F56E5A192" }, { "criteria": "cpe:2.3:a:david_paleino:wicd:1.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2265EFEA-CEF9-42E0-A538-8D8FAE5F351C" }, { "criteria": "cpe:2.3:a:david_paleino:wicd:1.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7769F3E0-EF1A-480C-845E-7178F2939ECD" }, { "criteria": "cpe:2.3:a:david_paleino:wicd:1.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22A39899-C5D7-47D0-9B9C-6ADD1F756B46" }, { "criteria": "cpe:2.3:a:david_paleino:wicd:1.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27ED667E-BD1E-4352-A5F0-DB70B86D600D" }, { "criteria": "cpe:2.3:a:david_paleino:wicd:1.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84B74048-746F-4DF7-913D-3F0163FC8FD1" }, { "criteria": "cpe:2.3:a:david_paleino:wicd:1.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9E268AD-D2A5-48DD-A311-6C2CD8A67149" }, { "criteria": "cpe:2.3:a:david_paleino:wicd:1.5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5FE6B55-58EA-403E-AA60-2079A559D2CB" } ], "operator": "OR" } ] } ]