SB2011102105 - Gentoo update for D-Bus
Published: October 21, 2011 Updated: September 25, 2016
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Resource management error (CVE-ID: CVE-2010-4352)
The vulnerability allows a local non-authenticated attacker to perform service disruption.
Stack consumption vulnerability in D-Bus (aka DBus) before 1.4.1 allows local users to cause a denial of service (daemon crash) via a message containing many nested variants.
2) Input validation error (CVE-ID: cve-2011-2200)
The vulnerability allows a local non-authenticated attacker to read and manipulate data.
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct unspecified state-modification attacks via crafted messages.
3) Link following (CVE-ID: CVE-2011-2533)
The vulnerability allows a remote non-authenticated attacker to manipulate or delete data.
The configure script in D-Bus (aka DBus) 1.2.x before 1.2.28 allows local users to overwrite arbitrary files via a symlink attack on an unspecified file in /tmp/.
Remediation
Install update from vendor's website.