libgio, when used in setuid or other privileged programs in spice-gtk and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable. NOTE: it could be argued that this is a vulnerability in the applications that do not cleanse environment variables, not in libgio itself.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T20:35:09.731Z
Reserved: 2012-08-21T00:00:00
Link: CVE-2012-4425

No data.

Status : Modified
Published: 2012-09-18T17:55:08.020
Modified: 2024-11-21T01:42:51.690
Link: CVE-2012-4425
