Lucene search

K
centosCentOS ProjectCESA-2005:102
HistoryJun 08, 2005 - 5:58 p.m.

dbus security update

2005-06-0817:58:27
CentOS Project
lists.centos.org
47

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

5.1%

CentOS Errata and Security Advisory CESA-2005:102

D-BUS is a system for sending messages between applications. It is
used both for the systemwide message bus service, and as a
per-user-login-session messaging facility.

Dan Reed discovered that a user can send and listen to messages on another
user’s per-user session bus if they know the address of the socket. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2005-0201 to this issue. In Red Hat Enterprise Linux 4, the
per-user session bus is only used for printing notifications, therefore
this issue would only allow a local user to examine or send additional
print notification messages.

Users of dbus are advised to upgrade to these updated packages,
which contain backported patches to correct this issue.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-June/073960.html
https://lists.centos.org/pipermail/centos-announce/2005-June/073966.html
https://lists.centos.org/pipermail/centos-announce/2005-June/073967.html

Affected packages:
dbus
dbus-devel
dbus-glib
dbus-python
dbus-x11

Upstream details at:
https://access.redhat.com/errata/RHSA-2005:102

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

5.1%