ID CVE-2009-4144
Summary NetworkManager (NM) 0.7.2 does not ensure that the configured Certification Authority (CA) certificate file for a (1) WPA Enterprise or (2) 802.1x network remains present upon a connection attempt, which might allow remote attackers to obtain sensitive information or cause a denial of service (connectivity disruption) by spoofing the identity of a wireless network.
References
Vulnerable Configurations
  • cpe:2.3:a:gnome:networkmanager:0.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:networkmanager:0.7.2:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 19-09-2017 - 01:29)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
oval via4
accepted 2013-04-29T04:13:10.510-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 5
    oval oval:org.mitre.oval:def:11414
  • comment The operating system installed on the system is CentOS Linux 5.x
    oval oval:org.mitre.oval:def:15802
  • comment Oracle Linux 5.x
    oval oval:org.mitre.oval:def:15459
description NetworkManager (NM) 0.7.2 does not ensure that the configured Certification Authority (CA) certificate file for a (1) WPA Enterprise or (2) 802.1x network remains present upon a connection attempt, which might allow remote attackers to obtain sensitive information or cause a denial of service (connectivity disruption) by spoofing the identity of a wireless network.
family unix
id oval:org.mitre.oval:def:11315
status accepted
submitted 2010-07-09T03:56:16-04:00
title NetworkManager (NM) 0.7.2 does not ensure that the configured Certification Authority (CA) certificate file for a (1) WPA Enterprise or (2) 802.1x network remains present upon a connection attempt, which might allow remote attackers to obtain sensitive information or cause a denial of service (connectivity disruption) by spoofing the identity of a wireless network.
version 18
redhat via4
advisories
rhsa
id RHSA-2010:0108
rpms
  • NetworkManager-1:0.7.0-9.el5_4
  • NetworkManager-debuginfo-1:0.7.0-9.el5_4
  • NetworkManager-devel-1:0.7.0-9.el5_4
  • NetworkManager-glib-1:0.7.0-9.el5_4
  • NetworkManager-glib-devel-1:0.7.0-9.el5_4
  • NetworkManager-gnome-1:0.7.0-9.el5_4
refmap via4
bid 37580
confirm
mlist [oss-security] 20091216 NetworkManager CVE assignment
secunia 38420
suse SUSE-SR:2010:002
Last major update 19-09-2017 - 01:29
Published 23-12-2009 - 20:30
Last modified 19-09-2017 - 01:29
Back to Top