Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2012-4425Spice-gtk vulnerability

CWE-2648 documents7 sources
Severity
6.9MEDIUMNVD
EPSS
0.5%
top 33.27%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedSep 18
Latest updateMay 17

Description

libgio, when used in setuid or other privileged programs in spice-gtk and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable. NOTE: it could be argued that this is a vulnerability in the applications that do not cleanse environment variables, not in libgio itself.

CVSS vector

AV:L/AC:M/C:C/I:C/A:CExploitability: 3.4 | Impact: 10.0

Affected Packages2 packages

debiandebian/spice-gtk< spice-gtk 0.12-5 (bookworm)
Debianspice-gtk_project/spice-gtk< 0.12-5+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-c77h-vm5q-jc2m: libgio, when used in setuid or other privileged programs in spice-gtk and possibly other products, allows local users to gain privileges and execute a2022-05-17
OSV
CVE-2012-4425: libgio, when used in setuid or other privileged programs in spice-gtk and possibly other products, allows local users to gain privileges and execute a2012-09-18

💥Exploits & PoCs

1
Exploit-DB
libdbus - 'DBUS_SYSTEM_BUS_ADDRESS' Local Privilege Escalation2012-07-17

📋Vendor Advisories

2
Red Hat
spice-gtk/glib: Possible privilege escalation via un-sanitized environment variable2012-09-12
Debian
CVE-2012-4425: spice-gtk - libgio, when used in setuid or other privileged programs in spice-gtk and possib...2012

💬Community

2
Bugzilla
CVE-2012-4425 spice-gtk/glib: Possible privilege escalation via un-sanitized environment variable2012-09-14
Bugzilla
CVE-2012-4425 X.org: arbitrary code execution as root when libdbus >= 1.5 is used [fedora-all]2012-09-13