6.1 Medium
AI Score
Confidence
High
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
13.3%
libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X.org and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable. NOTE: libdbus maintainers state that this is a vulnerability in the applications that do not cleanse environment variables, not in libdbus itself: “we do not support use of libdbus in setuid binaries that do not sanitize their environment before their first call into libdbus.”
lists.opensuse.org/opensuse-security-announce/2012-09/msg00009.html
lists.opensuse.org/opensuse-security-announce/2012-09/msg00015.html
lists.opensuse.org/opensuse-security-announce/2012-10/msg00000.html
lists.opensuse.org/opensuse-updates/2012-10/msg00094.html
rhn.redhat.com/errata/RHSA-2012-1261.html
secunia.com/advisories/50537
secunia.com/advisories/50544
secunia.com/advisories/50710
stealth.openwall.net/null/dzug.c
www.exploit-db.com/exploits/21323
www.mandriva.com/security/advisories?name=MDVSA-2013:070
www.mandriva.com/security/advisories?name=MDVSA-2013:083
www.openwall.com/lists/oss-security/2012/07/10/4
www.openwall.com/lists/oss-security/2012/07/26/1
www.openwall.com/lists/oss-security/2012/09/12/6
www.openwall.com/lists/oss-security/2012/09/14/2
www.openwall.com/lists/oss-security/2012/09/17/2
www.securityfocus.com/bid/55517
www.ubuntu.com/usn/USN-1576-1
www.ubuntu.com/usn/USN-1576-2
bugs.freedesktop.org/show_bug.cgi?id=52202
bugzilla.novell.com/show_bug.cgi?id=697105
bugzilla.redhat.com/show_bug.cgi?id=847402