Executive Summary
Summary | |
---|---|
Title | dbus vulnerability |
Informations | |||
---|---|---|---|
Name | USN-144-1 | First vendor Publication | 2005-06-27 |
Vendor | Ubuntu | Last vendor Modification | 2005-06-27 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 2.1 | Attack Range | Local |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) The following packages are affected: dbus-1 The problem can be corrected by upgrading the affected package to version 0.22-1ubuntu2.1. You have to restart your Gnome session (i.e. log out and back in) after doing a standard system upgrade to effect the necessary changes. Details follow: Besides providing the global system-wide communication bus, dbus also offers per-user "session" buses which applications in an user's session can create and use to communicate with each other. Daniel Reed discovered that the default configuration of the session dbus allowed a local user to connect to another user's session bus if its address was known. The fixed packages restrict the default permissions to the user who owns the session dbus instance. Please note that a standard Ubuntu installation does not use the session bus for anything, so this can only be exploited if you are using custom software which uses it. |
Original Source
Url : http://www.ubuntu.com/usn/USN-144-1 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10973 | |||
Oval ID: | oval:org.mitre.oval:def:10973 | ||
Title: | D-BUS (dbus) before 0.22 does not properly restrict access to a socket, if the socket address is known, which allows local users to listen or send arbitrary messages on another user's per-user session bus via that socket. | ||
Description: | D-BUS (dbus) before 0.22 does not properly restrict access to a socket, if the socket address is known, which allows local users to listen or send arbitrary messages on another user's per-user session bus via that socket. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2005-0201 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 4 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
13446 | D-Bus Local Session Bus Hijack |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-07-05 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2005-102.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-144-1.nasl - Type : ACT_GATHER_INFO |
2005-09-17 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-822.nasl - Type : ACT_GATHER_INFO |
2005-06-25 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2005-105.nasl - Type : ACT_GATHER_INFO |
2005-06-10 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2005-102.nasl - Type : ACT_GATHER_INFO |
2005-02-03 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-111.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 12:00:04 |
|