wicd Privilege Escalation 0day Exploit

Published: 2012-04-12
Last Updated: 2012-04-12 11:24:57 UTC
by Guy Bruneau (Version: 2)
2 comment(s)

A vulnerability was found in the current Backtrack 5 R2 version of the "Wicd" ( Wireless Interface Connection Daemon) software, where several design flaws have been found culminating in privilege escalation exploit. [1]

To address this vulnerability, Wicd 1.7.2 was released to patch this vulnerability (CVE-2012-2095) as well as several other fixes have been included in this update. The list of fixes is available here and the latest tarball can be downloaded here.

Update 1: The privilege Escalation 0day exploit only affects the Wicd software and is not a Backtrack 5 R2 vulnerability.

[1] http://www.infosecinstitute.com/courses/ethical_hacking_training.html
[2] https://launchpad.net/wicd/+announcement/9888
[3] https://bugs.launchpad.net/wicd/+bug/979221
[4] https://launchpad.net/wicd/1.7/1.7.2/+download/wicd-1.7.2.tar.gz

-----------

Guy Bruneau IPSS Inc. gbruneau at isc dot sans dot edu

Keywords: Backtrack 5 R2 wicd
2 comment(s)

Comments

Perspective and clarity on the issue:
http://www.backtrack-linux.org/forums/showthread.php?t=49411
Should probably set the threat level Yellow.

Diary Archives