CVE-2011-2777

samples/powerbtn/powerbtn.sh in acpid (aka acpid2) 2.0.16 and earlier uses the pidof program incorrectly, which allows local users to gain privileges by running a program with the name kded4 and a DBUS_SESSION_BUS_ADDRESS environment variable containing commands.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.4 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 34%
VendorProductVersion
tedfelixacpid2
𝑥
≤ 2.0.16
tedfelixacpid2
2.0.0
tedfelixacpid2
2.0.1
tedfelixacpid2
2.0.2
tedfelixacpid2
2.0.3
tedfelixacpid2
2.0.4
tedfelixacpid2
2.0.5
tedfelixacpid2
2.0.6
tedfelixacpid2
2.0.7
tedfelixacpid2
2.0.8
tedfelixacpid2
2.0.9
tedfelixacpid2
2.0.10
tedfelixacpid2
2.0.11
tedfelixacpid2
2.0.12
tedfelixacpid2
2.0.13
tedfelixacpid2
2.0.14
tedfelixacpid2
2.0.15
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
acpid
bullseye
1:2.0.32-1
fixed
lenny
not-affected
bookworm
1:2.0.33-2
fixed
sid
1:2.0.34-1
fixed
trixie
1:2.0.34-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
acpid
oneiric
Fixed 1:2.0.10-1ubuntu2.3
released
natty
Fixed 1:2.0.7-1ubuntu2.4
released
maverick
Fixed 1.0.10-5ubuntu4.4
released
lucid
Fixed 1.0.10-5ubuntu2.5
released
hardy
ignored
Common Weakness Enumeration