Summary
Detail | |||
---|---|---|---|
Vendor | Freedesktop | First view | 2008-02-29 |
Product | Dbus | Last view | 2023-06-08 |
Version | 1.1.2 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:freedesktop:dbus |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.5 | 2023-06-08 | CVE-2023-34969 | D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6. |
6.5 | 2022-10-10 | CVE-2022-42012 | An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format. |
6.5 | 2022-10-10 | CVE-2022-42011 | An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type. |
6.5 | 2022-10-10 | CVE-2022-42010 | An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures. |
5.5 | 2020-06-08 | CVE-2020-12049 | An issue was discovered in dbus >= 1.3.0 before 1.12.18. The DBusServer in libdbus, as used in dbus-daemon, leaks file descriptors when a message exceeds the per-message file descriptor limit. A local attacker with access to the D-Bus system bus or another system service's private AF_UNIX socket could use this to make the system service reach its file descriptor limit, denying service to subsequent D-Bus clients. |
7.1 | 2019-06-11 | CVE-2019-12749 | dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass. |
1.9 | 2014-10-25 | CVE-2014-3636 | D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 allows local users to (1) cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors or (2) cause a denial of service (disconnect) via multiple messages that combine to have more than the allowed number of file descriptors for a single sendmsg call. |
2.1 | 2014-09-22 | CVE-2014-3639 | The dbus-daemon in D-Bus before 1.6.24 and 1.8.x before 1.8.8 does not properly close old connections, which allows local users to cause a denial of service (incomplete connection consumption and prevention of new connections) via a large number of incomplete connections. |
2.1 | 2014-09-22 | CVE-2014-3638 | The bus_connections_check_reply function in config-parser.c in D-Bus before 1.6.24 and 1.8.x before 1.8.8 allows local users to cause a denial of service (CPU consumption) via a large number of method calls. |
4.4 | 2014-09-22 | CVE-2014-3635 | Off-by-one error in D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8, when running on a 64-bit system and the max_message_unix_fds limit is set to an odd number, allows local users to cause a denial of service (dbus-daemon crash) or possibly execute arbitrary code by sending one more file descriptor than the limit, which triggers a heap-based buffer overflow or an assertion failure. |
2.1 | 2014-07-19 | CVE-2014-3532 | dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6, when running on Linux 2.6.37-rc4 or later, allows local users to cause a denial of service (system-bus disconnect of other services or applications) by sending a message containing a file descriptor, then exceeding the maximum recursion depth before the initial message is forwarded. |
2.1 | 2010-12-30 | CVE-2010-4352 | Stack consumption vulnerability in D-Bus (aka DBus) before 1.4.1 allows local users to cause a denial of service (daemon crash) via a message containing many nested variants. |
3.6 | 2009-04-27 | CVE-2009-1189 | The _dbus_validate_signature_with_reason function (dbus-marshal-validate.c) in D-Bus (aka DBus) before 1.2.14 uses incorrect logic to validate a basic type, which allows remote attackers to spoof a signature via a crafted key. NOTE: this is due to an incorrect fix for CVE-2008-3834. |
4.6 | 2008-12-09 | CVE-2008-4311 | The default configuration of system.conf in D-Bus (aka DBus) before 1.2.6 omits the send_type attribute in certain rules, which allows local users to bypass intended access restrictions by (1) sending messages, related to send_requested_reply; and possibly (2) receiving messages, related to receive_requested_reply. |
2.1 | 2008-10-07 | CVE-2008-3834 | The dbus_signature_validate function in the D-bus library (libdbus) before 1.2.4 allows remote attackers to cause a denial of service (application abort) via a message containing a malformed signature, which triggers a failed assertion error. |
4.6 | 2008-02-29 | CVE-2008-0595 | dbus-daemon in D-Bus before 1.0.3, and 1.1.x before 1.1.20, recognizes send_interface attributes in allow directives in the security policy only for fully qualified method calls, which allows local users to bypass intended access restrictions via a method call with a NULL interface. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
30% (4) | CWE-399 | Resource Management Errors |
23% (3) | CWE-20 | Improper Input Validation |
7% (1) | CWE-404 | Improper Resource Shutdown or Release |
7% (1) | CWE-347 | Improper Verification of Cryptographic Signature |
7% (1) | CWE-129 | Improper Validation of Array Index |
7% (1) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
7% (1) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
7% (1) | CWE-16 | Configuration |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
69883 | D-Bus Message Validation Nested Variants DoS |
56165 | D-Bus dbus-marshal-validate.c _dbus_validate_signature_with_reason Function C... |
50644 | D-Bus system.conf Default Configuration Message Transmission Local Access Res... |
48990 | D-bus Library (libdbus) dbus_signature_validate Function Malformed Signature ... |
43038 | D-Bus dbus-daemon send_interface Local Security Policy Bypass |
ExploitDB Exploits
id | Description |
---|---|
7822 | D-Bus Daemon < 1.2.4 - (libdbus) Denial of Service Exploit |
OpenVAS Exploits
id | Description |
---|---|
2012-07-30 | Name : CentOS Update for dbus CESA-2011:0376 centos5 x86_64 File : nvt/gb_CESA-2011_0376_dbus_centos5_x86_64.nasl |
2012-02-12 | Name : Gentoo Security Advisory GLSA 201110-14 (D-Bus) File : nvt/glsa_201110_14.nasl |
2011-08-18 | Name : Fedora Update for dbus FEDORA-2011-9817 File : nvt/gb_fedora_2011_9817_dbus_fc14.nasl |
2011-08-09 | Name : CentOS Update for dbus CESA-2009:0008 centos5 i386 File : nvt/gb_CESA-2009_0008_dbus_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for dbus CESA-2010:0018 centos5 i386 File : nvt/gb_CESA-2010_0018_dbus_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for dbus CESA-2011:0376 centos5 i386 File : nvt/gb_CESA-2011_0376_dbus_centos5_i386.nasl |
2011-04-19 | Name : Fedora Update for dbus FEDORA-2010-19178 File : nvt/gb_fedora_2010_19178_dbus_fc13.nasl |
2011-03-25 | Name : RedHat Update for dbus RHSA-2011:0376-01 File : nvt/gb_RHSA-2011_0376-01_dbus.nasl |
2011-03-07 | Name : Debian Security Advisory DSA 2149-1 (dbus) File : nvt/deb_2149_1.nasl |
2011-01-21 | Name : Ubuntu Update for dbus vulnerability USN-1044-1 File : nvt/gb_ubuntu_USN_1044_1.nasl |
2010-12-28 | Name : Fedora Update for dbus FEDORA-2010-19166 File : nvt/gb_fedora_2010_19166_dbus_fc14.nasl |
2010-01-15 | Name : RedHat Update for dbus RHSA-2010:0018-01 File : nvt/gb_RHSA-2010_0018-01_dbus.nasl |
2009-12-10 | Name : Mandriva Security Advisory MDVSA-2009:256-1 (dbus) File : nvt/mdksa_2009_256_1.nasl |
2009-10-13 | Name : SLES10: Security update for dbus File : nvt/sles10_dbus-1.nasl |
2009-10-13 | Name : Mandrake Security Advisory MDVSA-2009:256 (dbus) File : nvt/mdksa_2009_256.nasl |
2009-10-13 | Name : SLES10: Security update for dbus File : nvt/sles10_dbus-10.nasl |
2009-10-13 | Name : SLES10: Security update for hal File : nvt/sles10_hal.nasl |
2009-10-11 | Name : SLES11: Security update for dbus File : nvt/sles11_dbus-1.nasl |
2009-07-29 | Name : Ubuntu USN-805-1 (ruby1.9) File : nvt/ubuntu_805_1.nasl |
2009-07-29 | Name : Ubuntu USN-799-1 (dbus) File : nvt/ubuntu_799_1.nasl |
2009-07-29 | Name : Debian Security Advisory DSA 1837-1 (dbus) File : nvt/deb_1837_1.nasl |
2009-04-28 | Name : SuSE Security Summary SUSE-SR:2009:009 File : nvt/suse_sr_2009_009.nasl |
2009-04-09 | Name : Mandriva Update for dbus MDVSA-2008:213 (dbus) File : nvt/gb_mandriva_MDVSA_2008_213.nasl |
2009-04-09 | Name : Mandriva Update for dbus MDVSA-2008:054 (dbus) File : nvt/gb_mandriva_MDVSA_2008_054.nasl |
2009-04-06 | Name : SuSE Security Summary SUSE-SR:2009:008 File : nvt/suse_sr_2009_008.nasl |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2017-05-01 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2016-1037.nasl - Type: ACT_GATHER_INFO |
2016-03-08 | Name: The remote VMware ESX host is missing a security-related patch. File: vmware_VMSA-2010-0004_remote.nasl - Type: ACT_GATHER_INFO |
2015-09-15 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL17256.nasl - Type: ACT_GATHER_INFO |
2015-05-20 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2014-1724-1.nasl - Type: ACT_GATHER_INFO |
2015-03-31 | Name: The remote Mandriva Linux host is missing one or more security updates. File: mandriva_MDVSA-2015-176.nasl - Type: ACT_GATHER_INFO |
2015-03-26 | Name: The remote Debian host is missing a security update. File: debian_DLA-87.nasl - Type: ACT_GATHER_INFO |
2015-01-02 | Name: The remote Fedora host is missing a security update. File: fedora_2014-17570.nasl - Type: ACT_GATHER_INFO |
2015-01-02 | Name: The remote Fedora host is missing a security update. File: fedora_2014-17595.nasl - Type: ACT_GATHER_INFO |
2014-12-22 | Name: The remote Fedora host is missing a security update. File: fedora_2014-16227.nasl - Type: ACT_GATHER_INFO |
2014-12-17 | Name: The remote Fedora host is missing a security update. File: fedora_2014-16147.nasl - Type: ACT_GATHER_INFO |
2014-12-15 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-3099.nasl - Type: ACT_GATHER_INFO |
2014-12-15 | Name: The remote Fedora host is missing a security update. File: fedora_2014-16243.nasl - Type: ACT_GATHER_INFO |
2014-12-15 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201412-12.nasl - Type: ACT_GATHER_INFO |
2014-11-19 | Name: The remote Mandriva Linux host is missing one or more security updates. File: mandriva_MDVSA-2014-214.nasl - Type: ACT_GATHER_INFO |
2014-11-17 | Name: The remote Red Hat host is missing one or more security updates. File: redhat-RHSA-2010-0476.nasl - Type: ACT_GATHER_INFO |
2014-11-17 | Name: The remote Red Hat host is missing a security update. File: redhat-RHSA-2011-0439.nasl - Type: ACT_GATHER_INFO |
2014-11-12 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_c1930f45698211e480e1bcaec565249c.nasl - Type: ACT_GATHER_INFO |
2014-09-26 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2014-557.nasl - Type: ACT_GATHER_INFO |
2014-09-25 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2014-558.nasl - Type: ACT_GATHER_INFO |
2014-09-23 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2352-1.nasl - Type: ACT_GATHER_INFO |
2014-09-19 | Name: The remote SuSE 11 host is missing one or more security updates. File: suse_11_dbus-1-140916.nasl - Type: ACT_GATHER_INFO |
2014-09-18 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_38242d513e5811e4ac2fbcaec565249c.nasl - Type: ACT_GATHER_INFO |
2014-09-17 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-3026.nasl - Type: ACT_GATHER_INFO |
2014-08-01 | Name: The remote Mandriva Linux host is missing one or more security updates. File: mandriva_MDVSA-2014-148.nasl - Type: ACT_GATHER_INFO |
2014-07-24 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2014-465.nasl - Type: ACT_GATHER_INFO |