First published: Fri Apr 23 2010(Updated: )
The desktop team recently discovered a flaw in dbus-glib where it didn't respect the "access" flag on properties specified. Basically, core OS services like NetworkManager which use dbus-glib were specifying e.g. the "Ip4Address" as read-only for remote access, but in fact any process could modify it. I have a patch for dbus-glib (attached). However, due to the nature of the way dbus-glib works where at build time services generate a C data structure from XML and embed it into their binary, affected services will need to be rebuilt (though not patched). This affected list is for F-12; I think for RHEL5 we just need dbus-glib and NetworkManager. KNOWN AFFECTED SERVICES: * DeviceKit-Power * NetworkManager * ModemManager KNOWN NOT AFFECTED that claim to handle org.freedesktop.DBus.Properties: * ConsoleKit (it denies all Properties access using dbus policy) * gdm (ditto) * PackageKit (all of the properties on exposed GObjects are G_PARAM_READONLY) KNOWN NOT AFFECTED (because I audited them) * gnome-panel (no dbus properties) * gnome-system-monitor (ditto) PROBABLY NOT AFFECTED * hal (doesn't claim to handle org.freedesktop.DBus.Properties) * polkit (uses eggdbus) * rtkit (doesn't use dbus-glib) * DeviceKit-disks (all its properties appear to be readonly) * wpa_supplicant (doesn't implement Properties) * upstart (doesn't use dbus-glib)
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS D-Bus GLib | ||
NetworkManager | ||
freedesktop DeviceKit-Power | ||
ModemManager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-585394 is considered high due to its potential to allow unauthorized modification of system properties.
To fix REDHAT-BUG-585394, update to the latest version of dbus-glib and ensure that access flags are correctly enforced.
The components affected by REDHAT-BUG-585394 include dbus-glib, NetworkManager, DeviceKit-Power, and ModemManager.
REDHAT-BUG-585394 impacts system security by allowing unauthorized processes to modify properties that should be restricted.
A potential workaround for REDHAT-BUG-585394 is to manually restrict access to sensitive properties until an update can be applied.