Executive Summary

Summary
Title D-Bus vulnerability
Informations
NameUSN-799-1First vendor Publication2009-07-13
VendorUbuntuLast vendor Modification2009-07-13
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:N/I:P/A:P)
Cvss Base Score3.6Attack RangeLocal
Cvss Impact Score4.9Attack ComplexityLow
Cvss Expoit Score3.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 8.04 LTS
Ubuntu 8.10
Ubuntu 9.04

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
libdbus-1-2 0.60-6ubuntu8.4

Ubuntu 8.04 LTS:
libdbus-1-3 1.1.20-1ubuntu3.3

Ubuntu 8.10:
libdbus-1-3 1.2.4-0ubuntu1.1

Ubuntu 9.04:
libdbus-1-3 1.2.12-0ubuntu2.1

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

Details follow:

It was discovered that the D-Bus library did not correctly validate
signatures. If a local user sent a specially crafted D-Bus key, they could
spoof a valid signature and bypass security policies.


Original Source

Url : http://www.ubuntu.com/usn/USN-799-1

CWE : Common Weakness Enumeration

idName
CWE-20Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:21815
 
Oval ID: oval:org.mitre.oval:def:21815
Title: RHSA-2010:0018: dbus security update (Moderate)
Description: The _dbus_validate_signature_with_reason function (dbus-marshal-validate.c) in D-Bus (aka DBus) before 1.2.14 uses incorrect logic to validate a basic type, which allows remote attackers to spoof a signature via a crafted key. NOTE: this is due to an incorrect fix for CVE-2008-3834.
Family: unix Class: patch
Reference(s): RHSA-2010:0018-01
CESA-2010:0018
CVE-2009-1189
Version: 4
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): dbus
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:10308
 
Oval ID: oval:org.mitre.oval:def:10308
Title: The _dbus_validate_signature_with_reason function (dbus-marshal-validate.c) in D-Bus (aka DBus) before 1.2.14 uses incorrect logic to validate a basic type, which allows remote attackers to spoof a signature via a crafted key. NOTE: this is due to an incorrect fix for CVE-2008-3834.
Description: The _dbus_validate_signature_with_reason function (dbus-marshal-validate.c) in D-Bus (aka DBus) before 1.2.14 uses incorrect logic to validate a basic type, which allows remote attackers to spoof a signature via a crafted key. NOTE: this is due to an incorrect fix for CVE-2008-3834.
Family: unix Class: vulnerability
Reference(s): CVE-2009-1189
Version: 5
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22736
 
Oval ID: oval:org.mitre.oval:def:22736
Title: ELSA-2010:0018: dbus security update (Moderate)
Description: The _dbus_validate_signature_with_reason function (dbus-marshal-validate.c) in D-Bus (aka DBus) before 1.2.14 uses incorrect logic to validate a basic type, which allows remote attackers to spoof a signature via a crafted key. NOTE: this is due to an incorrect fix for CVE-2008-3834.
Family: unix Class: patch
Reference(s): ELSA-2010:0018-01
CVE-2009-1189
Version: 3
Platform(s): Oracle Linux 5
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application49

OpenVAS Exploits

DateDescription
2011-08-09Name : CentOS Update for dbus CESA-2010:0018 centos5 i386
File : nvt/gb_CESA-2010_0018_dbus_centos5_i386.nasl
2010-01-15Name : RedHat Update for dbus RHSA-2010:0018-01
File : nvt/gb_RHSA-2010_0018-01_dbus.nasl
2009-12-10Name : Mandriva Security Advisory MDVSA-2009:256-1 (dbus)
File : nvt/mdksa_2009_256_1.nasl
2009-10-13Name : Mandrake Security Advisory MDVSA-2009:256 (dbus)
File : nvt/mdksa_2009_256.nasl
2009-07-29Name : Debian Security Advisory DSA 1837-1 (dbus)
File : nvt/deb_1837_1.nasl
2009-07-29Name : Ubuntu USN-799-1 (dbus)
File : nvt/ubuntu_799_1.nasl
2009-07-29Name : Ubuntu USN-805-1 (ruby1.9)
File : nvt/ubuntu_805_1.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
56165D-Bus dbus-marshal-validate.c _dbus_validate_signature_with_reason Function C...

Nessus® Vulnerability Scanner

DateDescription
2013-07-12Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2010-0018.nasl - Type : ACT_GATHER_INFO
2012-08-01Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20100107_dbus_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2011-12-13Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_dbus-1-7482.nasl - Type : ACT_GATHER_INFO
2011-04-29Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_dbus-1-7483.nasl - Type : ACT_GATHER_INFO
2011-04-29Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_dbus-1-110418.nasl - Type : ACT_GATHER_INFO
2010-03-05Name : The remote VMware ESX host is missing one or more security-related patches.
File : vmware_VMSA-2010-0004.nasl - Type : ACT_GATHER_INFO
2010-02-24Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1837.nasl - Type : ACT_GATHER_INFO
2010-01-08Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2010-0018.nasl - Type : ACT_GATHER_INFO
2010-01-08Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2010-0018.nasl - Type : ACT_GATHER_INFO
2009-10-07Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2009-256.nasl - Type : ACT_GATHER_INFO
2009-07-14Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-799-1.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2014-02-17 12:06:04
  • Multiple Updates
2013-05-11 00:56:05
  • Multiple Updates