[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2019-1246

ID: oval:org.secpod.oval:def:1601027Date: (C)2019-07-30   (M)2023-11-10
Class: PATCHFamily: unix




dbus as used in DBusServer, allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass

Platform:
Amazon Linux AMI
Product:
dbus
Reference:
ALAS-2019-1246
CVE-2019-12749
CVE    1
CVE-2019-12749
CPE    34
cpe:/o:amazon:linux
cpe:/a:freedesktop:dbus:1.10.6
cpe:/a:freedesktop:dbus:1.12.4
cpe:/a:freedesktop:dbus:1.4.0
...

© SecPod Technologies