CVE Vulnerabilities

CVE-2011-2520

Deserialization of Untrusted Data

Published: Jul 21, 2011 | Modified: Apr 11, 2025
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6 MEDIUM
AV:L/AC:H/Au:S/C:C/I:C/A:C
RedHat/V2
6 MODERATE
AV:L/AC:H/Au:S/C:C/I:C/A:C
RedHat/V3
Ubuntu
MEDIUM

fw_dbus.py in system-config-firewall 1.2.29 and earlier uses the pickle Python module unsafely during D-Bus communication between the GUI and the backend, which might allow local users to gain privileges via a crafted serialized object.

Weakness

The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.

Affected Software

Name Vendor Start Version End Version
System-config-firewall Redhat * 1.2.29 (including)
Red Hat Enterprise Linux 6 RedHat system-config-firewall-0:1.2.27-3.el6_1.3 *
Red Hat Enterprise Linux 6 RedHat system-config-printer-0:1.1.16-17.el6_1.2 *
System-config-printer Ubuntu hardy *

Potential Mitigations

  • Make fields transient to protect them from deserialization.
  • An attempt to serialize and then deserialize a class containing transient fields will result in NULLs where the transient data should be. This is an excellent way to prevent time, environment-based, or sensitive variables from being carried over and used improperly.

References