First published: Tue Jun 11 2019(Updated: )
A flaw was discovered in dbus where the implementation of DBUS_COOKIE_SHA1 is susceptible to a symbolic link attack. A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause the DBusServer to read and write in unintended locations. This could result in authentication bypass.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Freedesktop Dbus | <1.10.28 | |
Freedesktop Dbus | >=1.12.0<1.12.16 | |
Freedesktop Dbus | >=1.13.0<1.13.12 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Canonical Ubuntu Linux | =19.04 | |
redhat/dbus | <1.10.28 | 1.10.28 |
redhat/dbus | <1.12.16 | 1.12.16 |
redhat/dbus | <1.13.12 | 1.13.12 |
IBM Security Guardium | <=10.5 | |
IBM Security Guardium | <=10.6 | |
IBM Security Guardium | <=11.0 | |
IBM Security Guardium | <=11.1 | |
IBM Security Guardium | <=11.2 | |
IBM Security Guardium | <=11.3 | |
debian/dbus | 1.12.28-0+deb11u1 1.12.24-0+deb11u1 1.14.10-1~deb12u1 1.14.10-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-12749.
The severity of CVE-2019-12749 is critical with a severity value of 9.1.
The affected software for CVE-2019-12749 includes dbus versions 1.10.x, 1.12.x, and 1.13.x.
A remote attacker can exploit this vulnerability through cookie spoofing caused by symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library.
Yes, there are fixes available for CVE-2019-12749. Please refer to the vendor-specific advisories for the appropriate remediation steps.