CVE-2011-2777

EUVD-2011-2751
samples/powerbtn/powerbtn.sh in acpid (aka acpid2) 2.0.16 and earlier uses the pidof program incorrectly, which allows local users to gain privileges by running a program with the name kded4 and a DBUS_SESSION_BUS_ADDRESS environment variable containing commands.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.4 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 53%
Affected Products (NVD)
VendorProductVersion
tedfelixacpid2
𝑥
≤ 2.0.16
tedfelixacpid2
2.0.0
tedfelixacpid2
2.0.1
tedfelixacpid2
2.0.2
tedfelixacpid2
2.0.3
tedfelixacpid2
2.0.4
tedfelixacpid2
2.0.5
tedfelixacpid2
2.0.6
tedfelixacpid2
2.0.7
tedfelixacpid2
2.0.8
tedfelixacpid2
2.0.9
tedfelixacpid2
2.0.10
tedfelixacpid2
2.0.11
tedfelixacpid2
2.0.12
tedfelixacpid2
2.0.13
tedfelixacpid2
2.0.14
tedfelixacpid2
2.0.15
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
acpid
bookworm
1:2.0.33-2
fixed
bullseye
1:2.0.32-1
fixed
lenny
not-affected
sid
1:2.0.34-1
fixed
trixie
1:2.0.34-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
acpid
hardy
ignored
lucid
Fixed 1.0.10-5ubuntu2.5
released
maverick
Fixed 1.0.10-5ubuntu4.4
released
natty
Fixed 1:2.0.7-1ubuntu2.4
released
oneiric
Fixed 1:2.0.10-1ubuntu2.3
released
Common Weakness Enumeration