4.4
CVSSv2

CVE-2011-2777

Published: 29/08/2012 Updated: 20/12/2012
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
VMScore: 445
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

samples/powerbtn/powerbtn.sh in acpid (aka acpid2) 2.0.16 and previous versions uses the pidof program incorrectly, which allows local users to gain privileges by running a program with the name kded4 and a DBUS_SESSION_BUS_ADDRESS environment variable containing commands.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tedfelix acpid2 2.0.14

tedfelix acpid2

tedfelix acpid2 2.0.8

tedfelix acpid2 2.0.2

tedfelix acpid2 2.0.13

tedfelix acpid2 2.0.15

tedfelix acpid2 2.0.0

tedfelix acpid2 2.0.9

tedfelix acpid2 2.0.3

tedfelix acpid2 2.0.1

tedfelix acpid2 2.0.10

tedfelix acpid2 2.0.7

tedfelix acpid2 2.0.6

tedfelix acpid2 2.0.11

tedfelix acpid2 2.0.12

tedfelix acpid2 2.0.5

tedfelix acpid2 2.0.4

Vendor Advisories

Several security issues were fixed in acpid ...
Multiple vulnerabilities were found in the ACPI Daemon, the Advanced Configuration and Power Interface event daemon: CVE-2011-1159 Vasiliy Kulikov of OpenWall discovered that the socket handling is vulnerable to denial of service CVE-2011-2777 Oliver-Tobias Ripka discovered that incorrect process handling in the Debian-specific po ...

Exploits

# Exploit Title: Acpid Privilege Boundary Crossing Vulnerability # Google Dork: # Date: 23-11-2011 # Author: otr # Software Link: launchpadnet/ubuntu/+source/acpid # Version: 1:2010-1ubuntu2 # Tested on: Ubuntu 1110, Ubuntu 1104 # CVE : CVE-2011-2777 # -- # Safeguard this letter, it may be an IMPORTANT DOCUMENT #!/bin/bash # # otr # ...
Local proof of concept exploit that demonstrates a privilege boundary crossing vulnerability in acpid Written to work on Ubuntu 1110 and 1104 ...