First published: Fri Feb 29 2008(Updated: )
dbus-daemon in D-Bus before 1.0.3, and 1.1.x before 1.1.20, recognizes send_interface attributes in allow directives in the security policy only for fully qualified method calls, which allows local users to bypass intended access restrictions via a method call with a NULL interface.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =7 | |
Mandrake Linux | =2007 | |
Mandrake Linux | =2007.0_x86_64 | |
Mandrake Linux | =2007.1 | |
Mandrake Linux | =2007.1 | |
Mandrake Linux | =2008.0 | |
Mandrake Linux | =2008.0 | |
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =5.0 | |
Freedesktop D-Bus | <1.0.3 | |
Freedesktop D-Bus | >=1.1.0<1.1.20 | |
Mandrake Linux | =2007.1 | |
Mandrake Linux | =2008.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0595 has been classified as a medium severity vulnerability.
You can fix CVE-2008-0595 by upgrading D-Bus to version 1.0.3 or later, or ensure you are using a version within the 1.1.x series above 1.1.20.
CVE-2008-0595 affects D-Bus versions prior to 1.0.3 and 1.1.x before 1.1.20 on various distributions including Fedora, Mandrake, and Red Hat Enterprise Linux.
CVE-2008-0595 allows local users to bypass intended access restrictions through method calls with a NULL interface.
Yes, patches have been released for CVE-2008-0595 with the corresponding updates in the D-Bus versions mentioned.