[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-4462-1 dbus -- dbus

ID: oval:org.secpod.oval:def:603942Date: (C)2019-06-18   (M)2023-12-20
Class: PATCHFamily: unix




Joe Vennix discovered an authentication bypass vulnerability in dbus, an asynchronous inter-process communication system. The implementation of the DBUS_COOKIE_SHA1 authentication mechanism was susceptible to a symbolic link attack. A local attacker could take advantage of this flaw to bypass authentication and connect to a DBusServer with elevated privileges. The standard system and session dbus-daemons in their default configuration are not affected by this vulnerability. The vulnerability was addressed by upgrading dbus to a new upstream version 1.10.28 which includes additional fixes.

Platform:
Debian 9.x
Product:
dbus
libdbus-1-3
libdbus-1-dev
Reference:
DSA-4462-1
CVE-2019-12749
CVE    1
CVE-2019-12749
CPE    2
cpe:/o:debian:debian_linux:9.x
cpe:/a:freedesktop:dbus

© SecPod Technologies