The EnableNetwork method in the Network class in plugins/mechanism/Network.py in Blueman before 2.0.3 allows local users to gain privileges via the dhcp_handler argument.
Published 2016-01-08 19:59:16
Updated 2019-01-17 11:29:00
View at NVD,   CVE.org

Products affected by CVE-2015-8612

Exploit prediction scoring system (EPSS) score for CVE-2015-8612

0.51%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2015-8612

  • blueman set_dhcp_handler D-Bus Privilege Escalation
    Disclosure Date: 2015-12-18
    First seen: 2020-04-26
    exploit/linux/local/blueman_set_dhcp_handler_dbus_priv_esc
    This module attempts to gain root privileges by exploiting a Python code injection vulnerability in blueman versions prior to 2.0.3. The `org.blueman.Mechanism.EnableNetwork` D-Bus interface exposes the `set_dhcp_handler` function which uses user input in a call to

CVSS scores for CVE-2015-8612

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
7.2
HIGH AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
NIST
8.4
HIGH CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2.5
5.9
NIST

CWE ids for CVE-2015-8612

  • Assigned by: nvd@nist.gov (Primary)

References for CVE-2015-8612

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!