7.1 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
3.6 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:P/A:N
0.0005 Low
EPSS
Percentile
16.2%
Debian Security Advisory DSA-4462-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
June 13, 2019 https://www.debian.org/security/faq
Package : dbus
CVE ID : CVE-2019-12749
Debian Bug : 930375
Joe Vennix discovered an authentication bypass vulnerability in dbus, an
asynchronous inter-process communication system. The implementation of
the DBUS_COOKIE_SHA1 authentication mechanism was susceptible to a
symbolic link attack. A local attacker could take advantage of this flaw
to bypass authentication and connect to a DBusServer with elevated
privileges.
The standard system and session dbus-daemons in their default
configuration are not affected by this vulnerability.
The vulnerability was addressed by upgrading dbus to a new upstream
version 1.10.28 which includes additional fixes.
For the stable distribution (stretch), this problem has been fixed in
version 1.10.28-0+deb9u1.
We recommend that you upgrade your dbus packages.
For the detailed security status of dbus please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/dbus
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | i386 | libdbus-1-dev | < 1.8.22-0+deb8u2 | libdbus-1-dev_1.8.22-0+deb8u2_i386.deb |
Debian | 8 | amd64 | dbus-1-dbg | < 1.8.22-0+deb8u2 | dbus-1-dbg_1.8.22-0+deb8u2_amd64.deb |
Debian | 8 | armhf | libdbus-1-3-udeb | < 1.8.22-0+deb8u2 | libdbus-1-3-udeb_1.8.22-0+deb8u2_armhf.deb |
Debian | 9 | mips | libdbus-1-3 | < 1.10.28-0+deb9u1 | libdbus-1-3_1.10.28-0+deb9u1_mips.deb |
Debian | 9 | mips64el | dbus-1-dbg | < 1.10.28-0+deb9u1 | dbus-1-dbg_1.10.28-0+deb9u1_mips64el.deb |
Debian | 8 | amd64 | libdbus-1-3-udeb | < 1.8.22-0+deb8u2 | libdbus-1-3-udeb_1.8.22-0+deb8u2_amd64.deb |
Debian | 9 | mips64el | dbus | < 1.10.28-0+deb9u1 | dbus_1.10.28-0+deb9u1_mips64el.deb |
Debian | 9 | s390x | libdbus-1-3-udeb | < 1.10.28-0+deb9u1 | libdbus-1-3-udeb_1.10.28-0+deb9u1_s390x.deb |
Debian | 9 | amd64 | dbus-1-dbg | < 1.10.28-0+deb9u1 | dbus-1-dbg_1.10.28-0+deb9u1_amd64.deb |
Debian | 9 | ppc64el | dbus-udeb | < 1.10.28-0+deb9u1 | dbus-udeb_1.10.28-0+deb9u1_ppc64el.deb |
7.1 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
3.6 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:P/A:N
0.0005 Low
EPSS
Percentile
16.2%