
CVE-2009-4144 – NetworkManager: WPA enterprise network not verified when certificate is removed
https://notcve.org/view.php?id=CVE-2009-4144
23 Dec 2009 — NetworkManager (NM) 0.7.2 does not ensure that the configured Certification Authority (CA) certificate file for a (1) WPA Enterprise or (2) 802.1x network remains present upon a connection attempt, which might allow remote attackers to obtain sensitive information or cause a denial of service (connectivity disruption) by spoofing the identity of a wireless network. NetworkManager (NM) v0.7.2 no asegura que el fichero del certificado de la autoridad de certificación (CA) configurada para una red (1) WPA Ente... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560067 • CWE-310: Cryptographic Issues •

CVE-2009-4145 – NetworkManager: information disclosure by nm-connection-editor
https://notcve.org/view.php?id=CVE-2009-4145
23 Dec 2009 — nm-connection-editor in NetworkManager (NM) 0.7.x exports connection objects over D-Bus upon actions in the connection editor GUI, which allows local users to obtain sensitive information by reading D-Bus signals, as demonstrated by using dbus-monitor to discover the password for the WiFi network. nm-connection-editor en NetworkManager (NM) v0.7.x envía objetos de conexión por el D-Bus sobre acciones en el editor GUI de conexión, permitiendo a usuarios locales obtener información sensible al leer las señale... • http://git.gnome.org/browse/network-manager-applet/commit/?h=NETWORKMANAGER_APPLET_0_7&id=56d87fcb86acb5359558e0a2ee702cfc0c3391f2 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2005-2410
https://notcve.org/view.php?id=CVE-2005-2410
01 Aug 2005 — Format string vulnerability in the nm_info_handler function in Network Manager may allow remote attackers to execute arbitrary code via format string specifiers in a Wireless Access Point identifier, which is not properly handled in a syslog call. Vulnerabilidad de formateo de cadenas en la función nm_info_handler en Network Manager puede permitir que atacantes remotos ejecuten código arbitrario mediante especificadores de formato de cadenas (ya que no se manejan adecuadamente en una llamada syslog). • http://lwn.net/Alerts/145678 •