First published: Fri Aug 10 2012(Updated: )
libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X.org and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable. NOTE: libdbus maintainers state that this is a vulnerability in the applications that do not cleanse environment variables, not in libdbus itself: "we do not support use of libdbus in setuid binaries that do not sanitize their environment before their first call into libdbus."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
freedesktop libdbus | <=1.5.12 | |
freedesktop libdbus | =1.5.0 | |
freedesktop libdbus | =1.5.2 | |
freedesktop libdbus | =1.5.4 | |
freedesktop libdbus | =1.5.6 | |
freedesktop libdbus | =1.5.8 | |
freedesktop libdbus | =1.5.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3524 is classified as a high severity vulnerability that allows local users to gain privileges and execute arbitrary code.
To fix CVE-2012-3524, update libdbus to version 1.5.14 or later, which contains the necessary security patches.
CVE-2012-3524 affects libdbus versions 1.5.x and earlier, including 1.5.0 through 1.5.12.
CVE-2012-3524 is a local privilege escalation vulnerability and cannot be exploited remotely.
The impact of CVE-2012-3524 includes unauthorized privilege escalation, potentially allowing an attacker to execute arbitrary code with elevated privileges.