First published: Thu Dec 16 2010(Updated: )
A stack overflow flaw was found in the way the D-BUS message bus service / messaging facility validated messages with excessive number of nested variants. A local, authenticated user could use this flaw to cause dbus daemon to crash (denial of service) via a specially-crafted message sent to the system bus. References: [1] <a href="http://www.remlab.net/op/dbus-variant-recursion.shtml">http://www.remlab.net/op/dbus-variant-recursion.shtml</a> Upstream bug report: [2] <a href="https://bugs.freedesktop.org/show_bug.cgi?id=32321">https://bugs.freedesktop.org/show_bug.cgi?id=32321</a> CVE Request: [3] <a href="http://www.openwall.com/lists/oss-security/2010/12/16/3">http://www.openwall.com/lists/oss-security/2010/12/16/3</a> Credit: Rémi Denis-Courmont
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
dbus | <=1.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4352 is classified as a denial of service vulnerability due to a stack overflow issue in the D-BUS service.
To mitigate CVE-2010-4352, upgrade to a version of D-BUS that is newer than 1.4.0 where the vulnerability is patched.
CVE-2010-4352 affects local authenticated users on systems running D-BUS versions up to and including 1.4.0.
An attacker leveraging CVE-2010-4352 could crash the D-BUS daemon, resulting in a denial of service on the affected system.
CVE-2010-4352 was reported on December 20, 2010.