First published: Sun Jun 12 2011(Updated: )
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct unspecified state-modification attacks via crafted messages.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/dbus | <1.1.28 | 1.1.28 |
redhat/dbus | <1.4.12 | 1.4.12 |
redhat/dbus | <1.5.4 | 1.5.4 |
dbus | =1.5.0 | |
dbus | =1.5.2 | |
dbus | =1.4.8 | |
dbus | =1.4.1 | |
dbus | =1.4.0 | |
dbus | =1.4.6 | |
dbus | =1.4.10 | |
dbus | =1.4.4 | |
dbus | =1.2.4.2 | |
dbus | =1.2.1 | |
dbus | =1.2.14 | |
dbus | =1.2.4 | |
dbus | =1.2.4.4 | |
dbus | =1.2.2 | |
dbus | =1.2.10 | |
dbus | =1.2.8 | |
dbus | =1.2.12 | |
dbus | =1.2.26 | |
dbus | =1.2.24 | |
dbus | =1.2.22 | |
dbus | =1.2.4.6 | |
dbus | =1.2.6 | |
dbus | =1.2.20 | |
dbus | =1.2.16 | |
dbus | =1.2.18 | |
dbus | =1.2.3 | |
Freedesktop D-Bus | =1.5.0 | |
Freedesktop D-Bus | =1.5.2 | |
Freedesktop D-Bus | =1.4.0 | |
Freedesktop D-Bus | =1.4.1 | |
Freedesktop D-Bus | =1.4.4 | |
Freedesktop D-Bus | =1.4.6 | |
Freedesktop D-Bus | =1.4.8 | |
Freedesktop D-Bus | =1.4.10 | |
Freedesktop D-Bus | =1.2.1 | |
Freedesktop D-Bus | =1.2.2 | |
Freedesktop D-Bus | =1.2.3 | |
Freedesktop D-Bus | =1.2.4 | |
Freedesktop D-Bus | =1.2.6 | |
Freedesktop D-Bus | =1.2.8 | |
Freedesktop D-Bus | =1.2.10 | |
Freedesktop D-Bus | =1.2.12 | |
Freedesktop D-Bus | =1.2.14 | |
Freedesktop D-Bus | =1.2.16 | |
Freedesktop D-Bus | =1.2.18 | |
Freedesktop D-Bus | =1.2.20 | |
Freedesktop D-Bus | =1.2.22 | |
Freedesktop D-Bus | =1.2.24 | |
Freedesktop D-Bus | =1.2.26 |
http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.2&id=6519a1f77c61d753d4c97efd6e15630eb275336e
http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2200 has a high severity level as it can cause denial of service due to improper handling of non-native byte order.
To fix CVE-2011-2200, you should update D-Bus to version 1.2.28 or later for the 1.2.x series, 1.4.12 or later for the 1.4.x series, or 1.5.4 or later for the 1.5.x series.
CVE-2011-2200 affects D-Bus versions prior to 1.2.28, 1.4.12, and 1.5.4.
No, CVE-2011-2200 can only be exploited by local users.
The consequences of CVE-2011-2200 include denial of service, which may result in connection loss.