Lucene search

K
f5F5F5:K17256
HistorySep 14, 2015 - 12:00 a.m.

K17256 : D-Bus vulnerability CVE-2014-3638

2015-09-1400:00:00
my.f5.com
18

5.7 Medium

AI Score

Confidence

High

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

0.0004 Low

EPSS

Percentile

5.7%

Security Advisory Description

The bus_connections_check_reply function in config-parser.c in D-Bus before 1.6.24 and 1.8.x before 1.8.8 allows local users to cause a denial of service (CPU consumption) via a large number of method calls. (CVE-2014-3638)

Impact

A locally authenticated user may be able to use the flaw in D-Bus to cause excessive resource consumption. There is no remote access vector for this issue on data or control plane.

5.7 Medium

AI Score

Confidence

High

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

0.0004 Low

EPSS

Percentile

5.7%