Vulnerability Description
The EnableNetwork method in the Network class in plugins/mechanism/Network.py in Blueman before 2.0.3 allows local users to gain privileges via the dhcp_handler argument.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Blueman Project | Blueman | <= 2.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/135047/Slackware-Security-Advisory-blueman-
- http://www.debian.org/security/2015/dsa-3427
- http://www.openwall.com/lists/oss-security/2015/12/18/6
- http://www.openwall.com/lists/oss-security/2015/12/19/1
- http://www.securityfocus.com/bid/79688
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slack
- https://github.com/blueman-project/blueman/issues/416
- https://github.com/blueman-project/blueman/releases/tag/2.0.3
- https://twitter.com/thegrugq/status/677809527882813440
- https://www.exploit-db.com/exploits/46186/
- http://packetstormsecurity.com/files/135047/Slackware-Security-Advisory-blueman-
- http://www.debian.org/security/2015/dsa-3427
- http://www.openwall.com/lists/oss-security/2015/12/18/6
- http://www.openwall.com/lists/oss-security/2015/12/19/1
- http://www.securityfocus.com/bid/79688
FAQ
What is CVE-2015-8612?
CVE-2015-8612 is a vulnerability with a CVSS score of 8.4 (HIGH). The EnableNetwork method in the Network class in plugins/mechanism/Network.py in Blueman before 2.0.3 allows local users to gain privileges via the dhcp_handler argument.
How severe is CVE-2015-8612?
CVE-2015-8612 has been rated HIGH with a CVSS base score of 8.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-8612?
Check the references section above for vendor advisories and patch information. Affected products include: Blueman Project Blueman.