First published: Sat Oct 25 2014(Updated: )
D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 allows local users to (1) cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors or (2) cause a denial of service (disconnect) via multiple messages that combine to have more than the allowed number of file descriptors for a single sendmsg call.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
dbus | <=1.6.22 | |
Freedesktop D-Bus | =1.8.0 | |
Freedesktop D-Bus | =1.8.2 | |
Freedesktop D-Bus | =1.8.4 | |
Freedesktop D-Bus | =1.8.6 | |
SUSE Linux | =12.3 | |
dbus | =1.8.0 | |
dbus | =1.8.2 | |
dbus | =1.8.4 | |
dbus | =1.8.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3636 has been assessed as a denial of service vulnerability that can significantly disrupt local user operations.
To fix CVE-2014-3636, users should upgrade D-Bus to version 1.6.24 or later for the 1.6.x series or 1.8.8 or later for the 1.8.x series.
CVE-2014-3636 affects D-Bus versions 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8.
CVE-2014-3636 can enable local users to conduct denial of service attacks by exhausting the maximum number of file descriptors or sending multiple messages.
While updating D-Bus is the primary solution for CVE-2014-3636, mitigating local user access could help reduce potential risk.