SB2011102105 - Gentoo update for D-Bus



SB2011102105 - Gentoo update for D-Bus

Published: October 21, 2011 Updated: September 25, 2016

Security Bulletin ID SB2011102105
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Resource management error (CVE-ID: CVE-2010-4352)

The vulnerability allows a local non-authenticated attacker to perform service disruption.

Stack consumption vulnerability in D-Bus (aka DBus) before 1.4.1 allows local users to cause a denial of service (daemon crash) via a message containing many nested variants.


2) Input validation error (CVE-ID: cve-2011-2200)

The vulnerability allows a local non-authenticated attacker to read and manipulate data.

The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct unspecified state-modification attacks via crafted messages.


3) Link following (CVE-ID: CVE-2011-2533)

The vulnerability allows a remote non-authenticated attacker to manipulate or delete data.

The configure script in D-Bus (aka DBus) 1.2.x before 1.2.28 allows local users to overwrite arbitrary files via a symlink attack on an unspecified file in /tmp/.


Remediation

Install update from vendor's website.