The EnableNetwork method in the Network class in plugins/mechanism/Network.py in Blueman before 2.0.3 allows local users to gain privileges via the dhcp_handler argument.
Published 2016-01-08 19:59:16
Updated 2019-01-17 11:29:00
View at NVD,   CVE.org

Exploit prediction scoring system (EPSS) score for CVE-2015-8612

Probability of exploitation activity in the next 30 days: 0.51%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 74 % EPSS Score History EPSS FAQ

Metasploit modules for CVE-2015-8612

  • blueman set_dhcp_handler D-Bus Privilege Escalation
    Disclosure Date: 2015-12-18
    First seen: 2020-04-26
    exploit/linux/local/blueman_set_dhcp_handler_dbus_priv_esc
    This module attempts to gain root privileges by exploiting a Python code injection vulnerability in blueman versions prior to 2.0.3. The `org.blueman.Mechanism.EnableNetwork` D-Bus interface exposes the `set_dhcp_handler` function which uses user input in a call to

CVSS scores for CVE-2015-8612

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source
7.2
HIGH AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
NIST
8.4
HIGH CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2.5
5.9
NIST

CWE ids for CVE-2015-8612

  • Assigned by: nvd@nist.gov (Primary)

References for CVE-2015-8612

Products affected by CVE-2015-8612

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!