First published: Mon Sep 22 2014(Updated: )
The dbus-daemon in D-Bus before 1.6.24 and 1.8.x before 1.8.8 does not properly close old connections, which allows local users to cause a denial of service (incomplete connection consumption and prevention of new connections) via a large number of incomplete connections.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =12.3 | |
dbus | <=1.6.22 | |
Freedesktop D-Bus | =1.6.0 | |
Freedesktop D-Bus | =1.6.2 | |
Freedesktop D-Bus | =1.6.4 | |
Freedesktop D-Bus | =1.6.6 | |
Freedesktop D-Bus | =1.6.8 | |
Freedesktop D-Bus | =1.6.10 | |
Freedesktop D-Bus | =1.6.12 | |
Freedesktop D-Bus | =1.6.14 | |
Freedesktop D-Bus | =1.6.16 | |
Freedesktop D-Bus | =1.6.18 | |
Freedesktop D-Bus | =1.6.20 | |
Freedesktop D-Bus | =1.8.0 | |
Freedesktop D-Bus | =1.8.2 | |
Freedesktop D-Bus | =1.8.4 | |
Freedesktop D-Bus | =1.8.6 | |
dbus | =1.6.0 | |
dbus | =1.6.2 | |
dbus | =1.6.4 | |
dbus | =1.6.6 | |
dbus | =1.6.8 | |
dbus | =1.6.10 | |
dbus | =1.6.12 | |
dbus | =1.6.14 | |
dbus | =1.6.16 | |
dbus | =1.6.18 | |
dbus | =1.6.20 | |
dbus | =1.8.0 | |
dbus | =1.8.2 | |
dbus | =1.8.4 | |
dbus | =1.8.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3639 is classified as a denial of service vulnerability which allows local users to disrupt service by exhausting connection resources.
To fix CVE-2014-3639, update D-Bus to version 1.6.24 or later, or 1.8.8 or later.
CVE-2014-3639 affects systems running D-Bus versions prior to 1.6.24 and 1.8.8 across several distributions.
An attacker can exploit CVE-2014-3639 by opening numerous incomplete connections, leading to a denial of service.
Vulnerable versions include D-Bus versions 1.6.22 and below, and 1.8.6 and below.