First published: Wed Jun 12 2019(Updated: )
USN-4015-1 fixed a vulnerability in DBus. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Original advisory details: Joe Vennix discovered that DBus incorrectly handled DBUS_COOKIE_SHA1 authentication. A local attacker could possibly use this issue to bypass authentication and connect to DBus servers with elevated privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/dbus | <1.6.18-0ubuntu4.5+esm1 | 1.6.18-0ubuntu4.5+esm1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/libdbus-1-3 | <1.6.18-0ubuntu4.5+esm1 | 1.6.18-0ubuntu4.5+esm1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/dbus | <1.4.18-1ubuntu1.9 | 1.4.18-1ubuntu1.9 |
Ubuntu OpenSSH Client | =12.04 | |
All of | ||
ubuntu/libdbus-1-3 | <1.4.18-1ubuntu1.9 | 1.4.18-1ubuntu1.9 |
Ubuntu OpenSSH Client | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this DBus vulnerability is USN-4015-2.
The vulnerability in DBus allows local attackers to bypass authentication.
Ubuntu 14.04 and Ubuntu 12.04 are affected by this vulnerability.
You can fix the DBus vulnerability in Ubuntu 14.04 by updating the dbus and libdbus-1-3 packages to version 1.6.18-0ubuntu4.5+esm1.
You can fix the DBus vulnerability in Ubuntu 12.04 by updating the dbus and libdbus-1-3 packages to version 1.4.18-1ubuntu1.9.