Vulnerabilities > CVE-2011-2176 - Improper Authentication vulnerability in Gnome Networkmanager

047910
CVSS 2.1 - LOW
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
local
low complexity
gnome
CWE-287
nessus

Summary

GNOME NetworkManager before 0.8.6 does not properly enforce the auth_admin element in PolicyKit, which allows local users to bypass intended wireless network sharing restrictions via unspecified vectors.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Authentication Abuse
    An attacker obtains unauthorized access to an application, service or device either through knowledge of the inherent weaknesses of an authentication mechanism, or by exploiting a flaw in the authentication scheme's implementation. In such an attack an authentication mechanism is functioning but a carefully controlled sequence of events causes the mechanism to grant access to the attacker. This attack may exploit assumptions made by the target's authentication procedures, such as assumptions regarding trust relationships or assumptions regarding the generation of secret values. This attack differs from Authentication Bypass attacks in that Authentication Abuse allows the attacker to be certified as a valid user through illegitimate means, while Authentication Bypass allows the user to access protected material without ever being certified as an authenticated user. This attack does not rely on prior sessions established by successfully authenticating users, as relied upon for the "Exploitation of Session Variables, Resource IDs and other Trusted Credentials" attack patterns.
  • Exploiting Trust in Client (aka Make the Client Invisible)
    An attack of this type exploits a programs' vulnerabilities in client/server communication channel authentication and data integrity. It leverages the implicit trust a server places in the client, or more importantly, that which the server believes is the client. An attacker executes this type of attack by placing themselves in the communication channel between client and server such that communication directly to the server is possible where the server believes it is communicating only with a valid client. There are numerous variations of this type of attack.
  • Utilizing REST's Trust in the System Resource to Register Man in the Middle
    This attack utilizes a REST(REpresentational State Transfer)-style applications' trust in the system resources and environment to place man in the middle once SSL is terminated. Rest applications premise is that they leverage existing infrastructure to deliver web services functionality. An example of this is a Rest application that uses HTTP Get methods and receives a HTTP response with an XML document. These Rest style web services are deployed on existing infrastructure such as Apache and IIS web servers with no SOAP stack required. Unfortunately from a security standpoint, there frequently is no interoperable identity security mechanism deployed, so Rest developers often fall back to SSL to deliver security. In large data centers, SSL is typically terminated at the edge of the network - at the firewall, load balancer, or router. Once the SSL is terminated the HTTP request is in the clear (unless developers have hashed or encrypted the values, but this is rare). The attacker can utilize a sniffer such as Wireshark to snapshot the credentials, such as username and password that are passed in the clear once SSL is terminated. Once the attacker gathers these credentials, they can submit requests to the web service provider just as authorized user do. There is not typically an authentication on the client side, beyond what is passed in the request itself so once this is compromised, then this is generally sufficient to compromise the service's authentication scheme.
  • Man in the Middle Attack
    This type of attack targets the communication between two components (typically client and server). The attacker places himself in the communication channel between the two components. Whenever one component attempts to communicate with the other (data flow, authentication challenges, etc.), the data first goes to the attacker, who has the opportunity to observe or alter it, and it is then passed on to the other component as if it was never intercepted. This interposition is transparent leaving the two compromised components unaware of the potential corruption or leakage of their communications. The potential for Man-in-the-Middle attacks yields an implicit lack of trust in communication or identify between two components.

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-9005.NASL
    descriptionThis update ensures that users are authorized to start shared wifi connections, and includes fixes to retry failed connections after a period of time. It also ensures that
    last seen2020-06-01
    modified2020-06-02
    plugin id55529
    published2011-07-07
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/55529
    titleFedora 15 : NetworkManager-0.8.9997-5.git20110702.fc15 (2011-9005)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2011-171.NASL
    descriptionSecurity issues were identified and fixed in networkmanager : GNOME NetworkManager before 0.8.6 does not properly enforce the auth_admin element in PolicyKit, which allows local users to bypass intended wireless network sharing restrictions via unspecified vectors (CVE-2011-2176). Incomplete blacklist vulnerability in the svEscape function in settings/plugins/ifcfg-rh/shvar.c in the ifcfg-rh plug-in for GNOME NetworkManager 0.9.1, 0.9.0, 0.8.1, and possibly other versions, when PolicyKit is configured to allow users to create new connections, allows local users to execute arbitrary commands via a newline character in the name for a new network connection, which is not properly handled when writing to the ifcfg file (CVE-2011-3364). Instead of patching networkmanager, the latest 0.8.6.0 stable version is being provided due to the large amount of bugs fixed upstream. Also the networkmanager-applet, networkmanager-openconnect, networkmanager-openvpn, networkmanager-pptp, networkmanager-vpnc is being provided with their latest 0.8.6.0 stable versions. The provided packages solves these security vulnerabilities.
    last seen2020-06-01
    modified2020-06-02
    plugin id61935
    published2012-09-06
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61935
    titleMandriva Linux Security Advisory : networkmanager (MDVSA-2011:171)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_3_NETWORKMANAGER-111104.NASL
    descriptionNetworkManager did not pin a certificate
    last seen2020-06-01
    modified2020-06-02
    plugin id75683
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75683
    titleopenSUSE Security Update : NetworkManager (openSUSE-SU-2011:1273-1)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2011-0930.NASL
    descriptionFrom Red Hat Security Advisory 2011:0930 : Updated NetworkManager packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. NetworkManager is a network link manager that attempts to keep a wired or wireless network connection active at all times. It was found that NetworkManager did not properly enforce PolicyKit settings controlling the permissions to configure wireless network sharing. A local, unprivileged user could use this flaw to bypass intended PolicyKit restrictions, allowing them to enable wireless network sharing. (CVE-2011-2176) Users of NetworkManager should upgrade to these updated packages, which contain a backported patch to correct this issue. Running instances of NetworkManager must be restarted (
    last seen2020-06-01
    modified2020-06-02
    plugin id68306
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68306
    titleOracle Linux 6 : NetworkManager (ELSA-2011-0930)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-8612.NASL
    descriptionThis update fixes the security issue for creating shared WiFi networks. It
    last seen2020-06-01
    modified2020-06-02
    plugin id55842
    published2011-08-15
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/55842
    titleFedora 14 : NetworkManager-0.8.4-2.git20110622.fc14 (2011-8612)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20110712_NETWORKMANAGER_ON_SL6_X.NASL
    descriptionNetworkManager is a network link manager that attempts to keep a wired or wireless network connection active at all times. It was found that NetworkManager did not properly enforce PolicyKit settings controlling the permissions to configure wireless network sharing. A local, unprivileged user could use this flaw to bypass intended PolicyKit restrictions, allowing them to enable wireless network sharing. (CVE-2011-2176) Users of NetworkManager should upgrade to these updated packages, which contain a backported patch to correct this issue. Running instances of NetworkManager must be restarted (
    last seen2020-06-01
    modified2020-06-02
    plugin id61081
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61081
    titleScientific Linux Security Update : NetworkManager on SL6.x i386/x86_64
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2011-0930.NASL
    descriptionUpdated NetworkManager packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. NetworkManager is a network link manager that attempts to keep a wired or wireless network connection active at all times. It was found that NetworkManager did not properly enforce PolicyKit settings controlling the permissions to configure wireless network sharing. A local, unprivileged user could use this flaw to bypass intended PolicyKit restrictions, allowing them to enable wireless network sharing. (CVE-2011-2176) Users of NetworkManager should upgrade to these updated packages, which contain a backported patch to correct this issue. Running instances of NetworkManager must be restarted (
    last seen2020-06-01
    modified2020-06-02
    plugin id55585
    published2011-07-13
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/55585
    titleRHEL 6 : NetworkManager (RHSA-2011:0930)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_4_NETWORKMANAGER-111104.NASL
    descriptionNetworkManager did not pin a certificate
    last seen2020-06-01
    modified2020-06-02
    plugin id75976
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75976
    titleopenSUSE Security Update : NetworkManager (openSUSE-SU-2011:1273-1)

Redhat

advisories
bugzilla
id709662
titleCVE-2011-2176 NetworkManager: Did not honour PolicyKit auth_admin action element by creation of Ad-Hoc wireless networks
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 6 is installed
      ovaloval:com.redhat.rhba:tst:20111656003
    • OR
      • AND
        • commentNetworkManager-glib is earlier than 1:0.8.1-9.el6_1.1
          ovaloval:com.redhat.rhsa:tst:20110930001
        • commentNetworkManager-glib is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20110930002
      • AND
        • commentNetworkManager is earlier than 1:0.8.1-9.el6_1.1
          ovaloval:com.redhat.rhsa:tst:20110930003
        • commentNetworkManager is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20110930004
      • AND
        • commentNetworkManager-glib-devel is earlier than 1:0.8.1-9.el6_1.1
          ovaloval:com.redhat.rhsa:tst:20110930005
        • commentNetworkManager-glib-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20110930006
      • AND
        • commentNetworkManager-gnome is earlier than 1:0.8.1-9.el6_1.1
          ovaloval:com.redhat.rhsa:tst:20110930007
        • commentNetworkManager-gnome is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20110930008
      • AND
        • commentNetworkManager-devel is earlier than 1:0.8.1-9.el6_1.1
          ovaloval:com.redhat.rhsa:tst:20110930009
        • commentNetworkManager-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20110930010
rhsa
idRHSA-2011:0930
released2011-07-12
severityModerate
titleRHSA-2011:0930: NetworkManager security update (Moderate)
rpms
  • NetworkManager-1:0.8.1-9.el6_1.1
  • NetworkManager-debuginfo-1:0.8.1-9.el6_1.1
  • NetworkManager-devel-1:0.8.1-9.el6_1.1
  • NetworkManager-glib-1:0.8.1-9.el6_1.1
  • NetworkManager-glib-devel-1:0.8.1-9.el6_1.1
  • NetworkManager-gnome-1:0.8.1-9.el6_1.1