Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-0292

Опубликовано: 05 мар. 2013
Источник: debian
EPSS Низкий

Описание

The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dbus-glibfixed0.100.1-1package
dbus-glibfixed0.88-2.1+squeeze1squeezepackage

EPSS

Процентиль: 46%
0.00233
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.

redhat
больше 12 лет назад

The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.

nvd
больше 12 лет назад

The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.

github
больше 3 лет назад

The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.

oracle-oval
больше 12 лет назад

ELSA-2013-0568: dbus-glib security update (IMPORTANT)

EPSS

Процентиль: 46%
0.00233
Низкий