First published: Thu Sep 14 2023(Updated: )
It was discovered that DBus incorrectly handled certain invalid messages. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/dbus | <1.10.6-1ubuntu3.6+esm3 | 1.10.6-1ubuntu3.6+esm3 |
=16.04 | ||
All of | ||
ubuntu/libdbus-1-3 | <1.10.6-1ubuntu3.6+esm3 | 1.10.6-1ubuntu3.6+esm3 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this DBus vulnerability is USN-6372-1.
DBus incorrectly handles certain invalid messages, which can allow a local attacker to cause a denial of service by crashing the DBus service.
DBus version 1.10.6-1ubuntu3.6+esm3 and libdbus-1-3 version 1.10.6-1ubuntu3.6+esm3 on Ubuntu 16.04 are affected.
An attacker can exploit this vulnerability by sending certain invalid messages to the DBus service.
To fix the DBus vulnerability, update to version 1.10.6-1ubuntu3.6+esm3 or higher for DBus and libdbus-1-3.