First published: Mon Sep 22 2014(Updated: )
The bus_connections_check_reply function in config-parser.c in D-Bus before 1.6.24 and 1.8.x before 1.8.8 allows local users to cause a denial of service (CPU consumption) via a large number of method calls.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
dbus | <=1.6.22 | |
dbus | =1.6.0 | |
dbus | =1.6.2 | |
dbus | =1.6.4 | |
dbus | =1.6.6 | |
dbus | =1.6.8 | |
dbus | =1.6.10 | |
dbus | =1.6.12 | |
dbus | =1.6.14 | |
dbus | =1.6.16 | |
dbus | =1.6.18 | |
dbus | =1.6.20 | |
dbus | =1.8.0 | |
dbus | =1.8.2 | |
dbus | =1.8.4 | |
dbus | =1.8.6 | |
SUSE Linux | =12.3 | |
Freedesktop D-Bus | =1.6.0 | |
Freedesktop D-Bus | =1.6.2 | |
Freedesktop D-Bus | =1.6.4 | |
Freedesktop D-Bus | =1.6.6 | |
Freedesktop D-Bus | =1.6.8 | |
Freedesktop D-Bus | =1.6.10 | |
Freedesktop D-Bus | =1.6.12 | |
Freedesktop D-Bus | =1.6.14 | |
Freedesktop D-Bus | =1.6.16 | |
Freedesktop D-Bus | =1.6.18 | |
Freedesktop D-Bus | =1.6.20 | |
Freedesktop D-Bus | =1.8.0 | |
Freedesktop D-Bus | =1.8.2 | |
Freedesktop D-Bus | =1.8.4 | |
Freedesktop D-Bus | =1.8.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3638 has a severity rating that indicates it may cause a denial of service due to excessive CPU consumption.
To fix CVE-2014-3638, update D-Bus to version 1.6.24 or later, or 1.8.8 or later.
CVE-2014-3638 affects D-Bus versions prior to 1.6.24 and 1.8.x prior to 1.8.8.
CVE-2014-3638 is a local vulnerability and cannot be exploited remotely.
The impact of CVE-2014-3638 includes potential denial of service due to increased CPU consumption from method calls.