Lucene search

K
gentooGentoo FoundationGLSA-201909-08
HistorySep 08, 2019 - 12:00 a.m.

D-Bus: Authentication bypass

2019-09-0800:00:00
Gentoo Foundation
security.gentoo.org
100

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

3.6 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:P/A:N

0.0005 Low

EPSS

Percentile

16.2%

Background

D-Bus is a message bus system which processes can use to talk to each other.

Description

It was discovered that a local attacker could manipulate symbolic links in their own home directory to bypass authentication and connect to a DBusServer with elevated privileges.

Impact

A local attacker can bypass authentication mechanisms and elevate privileges.

Workaround

There is no known workaround at this time.

Resolution

All D-Bus users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-apps/dbus-1.12.16"
OSVersionArchitecturePackageVersionFilename
Gentooanyallsys-apps/dbus< 1.12.16UNKNOWN

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

3.6 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:P/A:N

0.0005 Low

EPSS

Percentile

16.2%