Lucene search

K
gentooGentoo FoundationGLSA-202011-11
HistoryNov 11, 2020 - 12:00 a.m.

Blueman: Local privilege escalation

2020-11-1100:00:00
Gentoo Foundation
security.gentoo.org
41
blueman
bluetooth
manager
local privilege escalation
polkit
permissions
dhcp daemon
root
upgrade
version

CVSS2

6.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:L

EPSS

0.001

Percentile

24.1%

Background

Blueman is a simple and intuitive GTK+ Bluetooth Manager.

Description

Where Polkit is not used and the default permissions have been changed on a specific rule file, control of a local DHCP daemon may be possible.

Impact

A local attacker may be able to achieve root privilege escalation.

Workaround

There is no known workaround at this time.

Resolution

All Blueman users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-wireless/blueman-2.1.4"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-wireless/blueman< 2.1.4UNKNOWN

CVSS2

6.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:L

EPSS

0.001

Percentile

24.1%