Vulnerabilities > CVE-2008-3834 - Improper Input Validation vulnerability in Freedesktop Dbus and Dbus1.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The dbus_signature_validate function in the D-bus library (libdbus) before 1.2.4 allows remote attackers to cause a denial of service (application abort) via a message containing a malformed signature, which triggers a failed assertion error.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Buffer Overflow via Environment Variables This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
- Server Side Include (SSI) Injection An attacker can use Server Side Include (SSI) Injection to send code to a web application that then gets executed by the web server. Doing so enables the attacker to achieve similar results to Cross Site Scripting, viz., arbitrary code execution and information disclosure, albeit on a more limited scale, since the SSI directives are nowhere near as powerful as a full-fledged scripting language. Nonetheless, the attacker can conveniently gain access to sensitive files, such as password files, and execute shell commands.
- Cross Zone Scripting An attacker is able to cause a victim to load content into their web-browser that bypasses security zone controls and gain access to increased privileges to execute scripting code or other web objects such as unsigned ActiveX controls or applets. This is a privilege elevation attack targeted at zone-based web-browser security. In a zone-based model, pages belong to one of a set of zones corresponding to the level of privilege assigned to that page. Pages in an untrusted zone would have a lesser level of access to the system and/or be restricted in the types of executable content it was allowed to invoke. In a cross-zone scripting attack, a page that should be assigned to a less privileged zone is granted the privileges of a more trusted zone. This can be accomplished by exploiting bugs in the browser, exploiting incorrect configuration in the zone controls, through a cross-site scripting attack that causes the attackers' content to be treated as coming from a more trusted page, or by leveraging some piece of system functionality that is accessible from both the trusted and less trusted zone. This attack differs from "Restful Privilege Escalation" in that the latter correlates to the inadequate securing of RESTful access methods (such as HTTP DELETE) on the server, while cross-zone scripting attacks the concept of security zones as implemented by a browser.
- Cross Site Scripting through Log Files An attacker may leverage a system weakness where logs are susceptible to log injection to insert scripts into the system's logs. If these logs are later viewed by an administrator through a thin administrative interface and the log data is not properly HTML encoded before being written to the page, the attackers' scripts stored in the log will be executed in the administrative interface with potentially serious consequences. This attack pattern is really a combination of two other attack patterns: log injection and stored cross site scripting.
- Command Line Execution through SQL Injection An attacker uses standard SQL injection methods to inject data into the command line for execution. This could be done directly through misuse of directives such as MSSQL_xp_cmdshell or indirectly through injection of data into the database that would be interpreted as shell commands. Sometime later, an unscrupulous backend application (or could be part of the functionality of the same application) fetches the injected data stored in the database and uses this data as command line arguments without performing proper validation. The malicious data escapes that data plane by spawning new commands to be executed on the host.
Exploit-Db
description | D-Bus Daemon < 1.2.4 (libdbus) Denial of Service Exploit. CVE-2008-3834. Dos exploits for multiple platform |
file | exploits/multiple/dos/7822.c |
id | EDB-ID:7822 |
last seen | 2016-02-01 |
modified | 2009-01-19 |
platform | multiple |
port | |
published | 2009-01-19 |
reporter | Jon Oberheide |
source | https://www.exploit-db.com/download/7822/ |
title | D-Bus Daemon < 1.2.4 - libdbus Denial of Service Exploit |
type | dos |
Nessus
NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2009-0008.NASL description From Red Hat Security Advisory 2009:0008 : Updated dbus packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. D-Bus is a system for sending messages between applications. It is used for the system-wide message bus service and as a per-user-login-session messaging facility. A denial-of-service flaw was discovered in the system for sending messages between applications. A local user could send a message with a malformed signature to the bus causing the bus (and, consequently, any process using libdbus to receive messages) to abort. (CVE-2008-3834) All users are advised to upgrade to these updated dbus packages, which contain backported patch which resolve this issue. For the update to take effect, all running instances of dbus-daemon and all running applications using libdbus library must be restarted, or the system rebooted. last seen 2020-06-01 modified 2020-06-02 plugin id 67785 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67785 title Oracle Linux 5 : dbus (ELSA-2009-0008) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Red Hat Security Advisory RHSA-2009:0008 and # Oracle Linux Security Advisory ELSA-2009-0008 respectively. # include("compat.inc"); if (description) { script_id(67785); script_version("1.9"); script_cvs_date("Date: 2019/10/25 13:36:07"); script_cve_id("CVE-2008-3834"); script_bugtraq_id(31602); script_xref(name:"RHSA", value:"2009:0008"); script_name(english:"Oracle Linux 5 : dbus (ELSA-2009-0008)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote Oracle Linux host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "From Red Hat Security Advisory 2009:0008 : Updated dbus packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. D-Bus is a system for sending messages between applications. It is used for the system-wide message bus service and as a per-user-login-session messaging facility. A denial-of-service flaw was discovered in the system for sending messages between applications. A local user could send a message with a malformed signature to the bus causing the bus (and, consequently, any process using libdbus to receive messages) to abort. (CVE-2008-3834) All users are advised to upgrade to these updated dbus packages, which contain backported patch which resolve this issue. For the update to take effect, all running instances of dbus-daemon and all running applications using libdbus library must be restarted, or the system rebooted." ); script_set_attribute( attribute:"see_also", value:"https://oss.oracle.com/pipermail/el-errata/2009-January/000845.html" ); script_set_attribute(attribute:"solution", value:"Update the affected dbus packages."); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_cwe_id(20); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:dbus"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:dbus-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:dbus-x11"); script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:5"); script_set_attribute(attribute:"vuln_publication_date", value:"2008/10/07"); script_set_attribute(attribute:"patch_publication_date", value:"2009/01/08"); script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/12"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Oracle Linux Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/OracleLinux", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/OracleLinux")) audit(AUDIT_OS_NOT, "Oracle Linux"); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || !pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux)", string:release)) audit(AUDIT_OS_NOT, "Oracle Linux"); os_ver = pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\.[0-9]+)?)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Oracle Linux"); os_ver = os_ver[1]; if (! preg(pattern:"^5([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Oracle Linux 5", "Oracle Linux " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Oracle Linux", cpu); flag = 0; if (rpm_check(release:"EL5", reference:"dbus-1.0.0-7.el5_2.1")) flag++; if (rpm_check(release:"EL5", reference:"dbus-devel-1.0.0-7.el5_2.1")) flag++; if (rpm_check(release:"EL5", reference:"dbus-x11-1.0.0-7.el5_2.1")) flag++; if (flag) { if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get()); else security_note(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "dbus / dbus-devel / dbus-x11"); }
NASL family SuSE Local Security Checks NASL id SUSE_DBUS-1-5683.NASL description This update fixes a denial of service bug in dbus. (CVE-2008-3834) last seen 2020-06-01 modified 2020-06-02 plugin id 34437 published 2008-10-17 reporter This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/34437 title openSUSE 10 Security Update : dbus-1 (dbus-1-5683) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2010-0018.NASL description Updated dbus packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. D-Bus is a system for sending messages between applications. It is used for the system-wide message bus service and as a per-user-login-session messaging facility. It was discovered that the Red Hat Security Advisory RHSA-2009:0008 did not correctly fix the denial of service flaw in the system for sending messages between applications. A local user could use this flaw to send a message with a malformed signature to the bus, causing the bus (and, consequently, any process using libdbus to receive messages) to abort. (CVE-2009-1189) Note: Users running any application providing services over the system message bus are advised to test this update carefully before deploying it in production environments. All users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all running instances of dbus-daemon and all running applications using the libdbus library must be restarted, or the system rebooted. last seen 2020-06-01 modified 2020-06-02 plugin id 43819 published 2010-01-08 reporter This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/43819 title RHEL 5 : dbus (RHSA-2010:0018) NASL family SuSE Local Security Checks NASL id SUSE_DBUS-1-5701.NASL description This update fixes a denial of service bug in dbus. (CVE-2008-3834) last seen 2020-06-01 modified 2020-06-02 plugin id 35034 published 2008-12-04 reporter This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/35034 title SuSE 10 Security Update : dbus (ZYPP Patch Number 5701) NASL family Mandriva Local Security Checks NASL id MANDRIVA_MDVSA-2008-213.NASL description The D-Bus library did not correctly validate certain corrupted signatures which could cause a crash of applications linked against the D-Bus library if a local user were to send a specially crafted D-Bus request (CVE-2008-3834). The updated packages have been patched to prevent this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 36288 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/36288 title Mandriva Linux Security Advisory : dbus (MDVSA-2008:213) NASL family SuSE Local Security Checks NASL id SUSE_11_0_DBUS-1-081016.NASL description This update fixes a denial of service bug in dbus. (CVE-2008-3834) last seen 2020-06-01 modified 2020-06-02 plugin id 39947 published 2009-07-21 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/39947 title openSUSE Security Update : dbus-1 (dbus-1-246) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1658.NASL description Colin Walters discovered that the dbus_signature_validate function in dbus, a simple interprocess messaging system, is prone to a denial of service attack. last seen 2020-06-01 modified 2020-06-02 plugin id 34478 published 2008-10-24 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/34478 title Debian DSA-1658-1 : dbus - programming error NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2010-0018.NASL description From Red Hat Security Advisory 2010:0018 : Updated dbus packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. D-Bus is a system for sending messages between applications. It is used for the system-wide message bus service and as a per-user-login-session messaging facility. It was discovered that the Red Hat Security Advisory RHSA-2009:0008 did not correctly fix the denial of service flaw in the system for sending messages between applications. A local user could use this flaw to send a message with a malformed signature to the bus, causing the bus (and, consequently, any process using libdbus to receive messages) to abort. (CVE-2009-1189) Note: Users running any application providing services over the system message bus are advised to test this update carefully before deploying it in production environments. All users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all running instances of dbus-daemon and all running applications using the libdbus library must be restarted, or the system rebooted. last seen 2020-06-01 modified 2020-06-02 plugin id 67981 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67981 title Oracle Linux 5 : dbus (ELSA-2010-0018) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2009-0008.NASL description Updated dbus packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. D-Bus is a system for sending messages between applications. It is used for the system-wide message bus service and as a per-user-login-session messaging facility. A denial-of-service flaw was discovered in the system for sending messages between applications. A local user could send a message with a malformed signature to the bus causing the bus (and, consequently, any process using libdbus to receive messages) to abort. (CVE-2008-3834) All users are advised to upgrade to these updated dbus packages, which contain backported patch which resolve this issue. For the update to take effect, all running instances of dbus-daemon and all running applications using libdbus library must be restarted, or the system rebooted. last seen 2020-06-01 modified 2020-06-02 plugin id 35317 published 2009-01-08 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/35317 title RHEL 5 : dbus (RHSA-2009:0008) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2010-0018.NASL description Updated dbus packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. D-Bus is a system for sending messages between applications. It is used for the system-wide message bus service and as a per-user-login-session messaging facility. It was discovered that the Red Hat Security Advisory RHSA-2009:0008 did not correctly fix the denial of service flaw in the system for sending messages between applications. A local user could use this flaw to send a message with a malformed signature to the bus, causing the bus (and, consequently, any process using libdbus to receive messages) to abort. (CVE-2009-1189) Note: Users running any application providing services over the system message bus are advised to test this update carefully before deploying it in production environments. All users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all running instances of dbus-daemon and all running applications using the libdbus library must be restarted, or the system rebooted. last seen 2020-06-01 modified 2020-06-02 plugin id 43817 published 2010-01-08 reporter This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/43817 title CentOS 5 : dbus (CESA-2010:0018) NASL family SuSE Local Security Checks NASL id SUSE_DBUS-1-7482.NASL description Local users could crash the D-Bus daemon by sending a specially crafted message (CVE-2010-4352). This update also properly fixes CVE-2008-3834 / CVE-2009-1189. last seen 2020-06-01 modified 2020-06-02 plugin id 57177 published 2011-12-13 reporter This script is Copyright (C) 2011-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/57177 title SuSE 10 Security Update : dbus (ZYPP Patch Number 7482) NASL family Fedora Local Security Checks NASL id FEDORA_2008-8764.NASL description Freedesktop bug #15588 Avoiding using noreplace for /etc/dbus-1/*.conf files - they last seen 2020-06-01 modified 2020-06-02 plugin id 34381 published 2008-10-10 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/34381 title Fedora 9 : dbus-1.2.4-1.fc9 (2008-8764) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2009-0008.NASL description Updated dbus packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. D-Bus is a system for sending messages between applications. It is used for the system-wide message bus service and as a per-user-login-session messaging facility. A denial-of-service flaw was discovered in the system for sending messages between applications. A local user could send a message with a malformed signature to the bus causing the bus (and, consequently, any process using libdbus to receive messages) to abort. (CVE-2008-3834) All users are advised to upgrade to these updated dbus packages, which contain backported patch which resolve this issue. For the update to take effect, all running instances of dbus-daemon and all running applications using libdbus library must be restarted, or the system rebooted. last seen 2020-06-01 modified 2020-06-02 plugin id 43724 published 2010-01-06 reporter This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/43724 title CentOS 5 : dbus (CESA-2009:0008) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-653-1.NASL description Havoc Pennington discovered that the D-Bus daemon did not correctly validate certain security policies. If a local user sent a specially crafted D-Bus request, they could bypass security policies that had a last seen 2020-06-01 modified 2020-06-02 plugin id 36805 published 2009-04-23 reporter Ubuntu Security Notice (C) 2009-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/36805 title Ubuntu 6.06 LTS / 7.04 / 7.10 / 8.04 LTS : dbus vulnerabilities (USN-653-1) NASL family SuSE Local Security Checks NASL id SUSE_11_DBUS-1-110418.NASL description Local users could crash the D-Bus daemon by sending a specially crafted message (CVE-2010-4352). This update also properly fixes CVE-2008-3834 / CVE-2009-1189. last seen 2020-06-01 modified 2020-06-02 plugin id 53587 published 2011-04-29 reporter This script is Copyright (C) 2011-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/53587 title SuSE 11.1 Security Update : dbus (SAT Patch Number 4434) NASL family SuSE Local Security Checks NASL id SUSE_DBUS-1-7483.NASL description Local users could crash the D-Bus daemon by sending a specially crafted message (CVE-2010-4352). This update also properly fixes CVE-2008-3834 / CVE-2009-1189. last seen 2020-06-01 modified 2020-06-02 plugin id 53590 published 2011-04-29 reporter This script is Copyright (C) 2011-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/53590 title SuSE 10 Security Update : dbus (ZYPP Patch Number 7483) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200901-04.NASL description The remote host is affected by the vulnerability described in GLSA-200901-04 (D-Bus: Denial of Service) schelte reported that the dbus_signature_validate() function can trigger a failed assertion when processing a message containing a malformed signature. Impact : A local user could send a specially crafted message to the D-Bus daemon, leading to a Denial of Service. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 35348 published 2009-01-12 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/35348 title GLSA-200901-04 : D-Bus: Denial of Service NASL family Mandriva Local Security Checks NASL id MANDRIVA_MDVSA-2009-256.NASL description A vulnerability was discovered and corrected in dbus : The _dbus_validate_signature_with_reason function (dbus-marshal-validate.c) in D-Bus (aka DBus) uses incorrect logic to validate a basic type, which allows remote attackers to spoof a signature via a crafted key. NOTE: this is due to an incorrect fix for CVE-2008-3834 (CVE-2009-1189). This update provides a fix for this vulnerability. Update : Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers last seen 2020-06-01 modified 2020-06-02 plugin id 42046 published 2009-10-07 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/42046 title Mandriva Linux Security Advisory : dbus (MDVSA-2009:256-1) NASL family SuSE Local Security Checks NASL id OPENSUSE-2012-750.NASL description 6 vulnerabilities were discovered for the dbus-1 and dbus-1-x11 packages in openSUSE versions 11.4, 12.1, and 12.2. last seen 2020-06-05 modified 2014-06-13 plugin id 74795 published 2014-06-13 reporter This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/74795 title openSUSE Security Update : dbus-1 / dbus-1-x11 (openSUSE-SU-2012:1418-1) NASL family Scientific Linux Local Security Checks NASL id SL_20090107_DBUS_ON_SL5_X.NASL description A denial-of-service flaw was discovered in the system for sending messages between applications. A local user could send a message with a malformed signature to the bus causing the bus (and, consequently, any process using libdbus to receive messages) to abort. (CVE-2008-3834) last seen 2020-06-01 modified 2020-06-02 plugin id 60510 published 2012-08-01 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/60510 title Scientific Linux Security Update : dbus on SL5.x i386/x86_64
Oval
accepted | 2013-04-29T04:04:03.362-04:00 | ||||||||||||
class | vulnerability | ||||||||||||
contributors |
| ||||||||||||
definition_extensions |
| ||||||||||||
description | The dbus_signature_validate function in the D-bus library (libdbus) before 1.2.4 allows remote attackers to cause a denial of service (application abort) via a message containing a malformed signature, which triggers a failed assertion error. | ||||||||||||
family | unix | ||||||||||||
id | oval:org.mitre.oval:def:10253 | ||||||||||||
status | accepted | ||||||||||||
submitted | 2010-07-09T03:56:16-04:00 | ||||||||||||
title | The dbus_signature_validate function in the D-bus library (libdbus) before 1.2.4 allows remote attackers to cause a denial of service (application abort) via a message containing a malformed signature, which triggers a failed assertion error. | ||||||||||||
version | 18 |
Packetstorm
data source | https://packetstormsecurity.com/files/download/74119/dbus-dos.txt |
id | PACKETSTORM:74119 |
last seen | 2016-12-05 |
published | 2009-01-20 |
reporter | Jon Oberheide |
source | https://packetstormsecurity.com/files/74119/D-Bus-Daemon-Denial-Of-Service.html |
title | D-Bus Daemon Denial Of Service |
Redhat
advisories |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
rpms |
|
Seebug
bulletinFamily exploit description BUGTRAQ ID: 31602 CVE ID:CVE-2008-3834 CNCVE ID:CNCVE-20083834 D-BUS是一款设计目标为应用程序间通信的消息总线系统。 D-BUS不正确处理包含在消息中的畸形签名,本地攻击者可以利用漏洞对使用此库的应用程序进行拒绝服务攻击。 当要求验证类型签名"a{(ii)i}"时可导致函数dbus_signature_validate()出现错误。 根据文档,dbus_signature_validate()可以用于检查类型签名的合法性,因此正确的必须是对上面提到的类型签名确定为非法。 D-BUS Inter-Process Communication System 1.2.1 可参考如下链接获得补丁信息: <a href=https://bugs.freedesktop.org/show_bug.cgi?id=17803 target=_blank>https://bugs.freedesktop.org/show_bug.cgi?id=17803</a> id SSV:4172 last seen 2017-11-19 modified 2008-10-08 published 2008-10-08 reporter Root source https://www.seebug.org/vuldb/ssvid-4172 title D-Bus 'dbus_signature_validate()'类型签名拒绝服务漏洞 bulletinFamily exploit description BUGTRAQ ID: 31602 CVE(CAN) ID: CVE-2008-3834 D-BUS是一个设计目标为应用程序间通信的消息总线系统。 D-BUS的_dbus_validate_signature_with_reason()函数没有正确地验证类型代码: if (last == DBUS_DICT_ENTRY_BEGIN_CHAR && !dbus_type_is_basic (*p)) { result = DBUS_INVALID_DICT_KEY_MUST_BE_BASIC_TYPE; goto out; } 如果使用D-Bus的应用受骗验证了特制的签名的话,就可能会终止。 D-Bus 1.2.1 D-Bus ----- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: <a href=http://admin.fedoraproject.org/updates/dbus-1.2.4-1.fc9 target=_blank>http://admin.fedoraproject.org/updates/dbus-1.2.4-1.fc9</a> id SSV:4192 last seen 2017-11-19 modified 2008-10-10 published 2008-10-10 reporter Root source https://www.seebug.org/vuldb/ssvid-4192 title D-Bus dbus_signature_validate()类型签名拒绝服务漏洞 bulletinFamily exploit description No description provided by source. id SSV:66216 last seen 2017-11-19 modified 2014-07-01 published 2014-07-01 reporter Root source https://www.seebug.org/vuldb/ssvid-66216 title D-Bus Daemon < 1.2.4 - (libdbus) Denial of Service Exploit bulletinFamily exploit description No description provided by source. id SSV:17745 last seen 2017-11-19 modified 2009-01-19 published 2009-01-19 reporter Root source https://www.seebug.org/vuldb/ssvid-17745 title D-Bus Daemon < 1.2.4 (libdbus) Denial of Service Exploit
References
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
- http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html
- http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html
- http://secunia.com/advisories/32127
- http://secunia.com/advisories/32127
- http://secunia.com/advisories/32230
- http://secunia.com/advisories/32230
- http://secunia.com/advisories/32281
- http://secunia.com/advisories/32281
- http://secunia.com/advisories/32385
- http://secunia.com/advisories/32385
- http://secunia.com/advisories/33396
- http://secunia.com/advisories/33396
- http://www.debian.org/security/2008/dsa-1658
- http://www.debian.org/security/2008/dsa-1658
- http://www.freedesktop.org/wiki/Software/dbus#head-dad0dab297a44f1d7a3b1259cfc06b583fd6a88a
- http://www.freedesktop.org/wiki/Software/dbus#head-dad0dab297a44f1d7a3b1259cfc06b583fd6a88a
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:213
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:213
- http://www.redhat.com/support/errata/RHSA-2009-0008.html
- http://www.redhat.com/support/errata/RHSA-2009-0008.html
- http://www.securityfocus.com/bid/31602
- http://www.securityfocus.com/bid/31602
- http://www.securitytracker.com/id?1021063
- http://www.securitytracker.com/id?1021063
- http://www.ubuntu.com/usn/usn-653-1
- http://www.ubuntu.com/usn/usn-653-1
- http://www.vupen.com/english/advisories/2008/2762
- http://www.vupen.com/english/advisories/2008/2762
- https://bugs.freedesktop.org/show_bug.cgi?id=17803
- https://bugs.freedesktop.org/show_bug.cgi?id=17803
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-3834
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-3834
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45701
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45701
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10253
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10253
- https://www.exploit-db.com/exploits/7822
- https://www.exploit-db.com/exploits/7822
- https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00298.html
- https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00298.html