First published: Wed Dec 10 2008(Updated: )
The default configuration of system.conf in D-Bus (aka DBus) before 1.2.6 omits the send_type attribute in certain rules, which allows local users to bypass intended access restrictions by (1) sending messages, related to send_requested_reply; and possibly (2) receiving messages, related to receive_requested_reply.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Freedesktop Dbus | =0.13 | |
Freedesktop Dbus | =0.60 | |
Freedesktop Dbus | =1.1.2 | |
Freedesktop Dbus | =0.34 | |
Freedesktop Dbus | =0.92 | |
Freedesktop Dbus | =0.50 | |
Freedesktop Dbus | =0.35.1 | |
Freedesktop Dbus | =0.5 | |
Freedesktop Dbus | =0.36.1 | |
Freedesktop Dbus | =0.33 | |
Freedesktop Dbus | =1.0-rc1 | |
Freedesktop Dbus | =0.10 | |
Freedesktop Dbus | =1.0 | |
Freedesktop Dbus | =0.11 | |
Freedesktop Dbus | =1.1.0 | |
Freedesktop Dbus | =0.2 | |
Freedesktop Dbus | =0.9 | |
Freedesktop Dbus | =0.23.2 | |
Freedesktop Dbus | =0.35 | |
Freedesktop Dbus | =0.91 | |
Freedesktop Dbus | =0.6 | |
Freedesktop Dbus | =0.8 | |
Freedesktop Dbus | =0.36 | |
Freedesktop Dbus | =0.32 | |
Freedesktop Dbus | =1.0-rc3 | |
Freedesktop Dbus | =0.22 | |
Freedesktop Dbus | =1.1.1 | |
Freedesktop Dbus | =0.4 | |
Freedesktop Dbus | =0.61 | |
Freedesktop Dbus | =0.21 | |
Freedesktop Dbus | =0.35.2 | |
Freedesktop Dbus | <=1.2.4 | |
Freedesktop Dbus | =0.23.3 | |
Freedesktop Dbus | =0.20 | |
Freedesktop Dbus | =1.0-rc2 | |
Freedesktop Dbus | =0.7 | |
Freedesktop Dbus | =0.1 | |
Freedesktop Dbus | =0.62 | |
Freedesktop Dbus | =0.23.1 | |
Freedesktop Dbus | =0.3 | |
Freedesktop Dbus | =0.12 | |
Freedesktop Dbus | =0.90 | |
Freedesktop Dbus | =1.1.4 | |
Freedesktop Dbus | =0.36.2 | |
Freedesktop Dbus | =0.23 | |
Freedesktop Dbus | =0.31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.