Scientific Linux Security Update : system-config-firewall on SL6.x i386/x86_64

medium Nessus Plugin ID 61084

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

system-config-firewall is a graphical user interface for basic firewall setup.

It was found that system-config-firewall used the Python pickle module in an insecure way when sending data (via D-Bus) to the privileged back-end mechanism. A local user authorized to configure firewall rules using system-config-firewall could use this flaw to execute arbitrary code with root privileges, by sending a specially crafted serialized object. (CVE-2011-2520)

This erratum updates system-config-firewall to use JSON (JavaScript Object Notation) for data exchange, instead of pickle. Therefore, an updated version of system-config-printer that uses this new communication data format is also provided in this erratum.

Users of system-config-firewall are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. Running instances of system-config-firewall must be restarted before the utility will be able to communicate with its updated back-end.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?3d0c8bc1

Plugin Details

Severity: Medium

ID: 61084

File Name: sl_20110718_system_config_firewall_on_SL6_x.nasl

Version: 1.6

Type: local

Agent: unix

Published: 8/1/2012

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6

Vector: CVSS2#AV:L/AC:H/Au:S/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 7/18/2011

Reference Information

CVE: CVE-2011-2520