Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-0292

Опубликовано: 14 фев. 2013
Источник: redhat
CVSS2: 6.9
EPSS Низкий

Описание

The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=911658dbus-glib: Local privilege escalation due improper filtering of message sender when NameOwnerChanged signal received

EPSS

Процентиль: 45%
0.00223
Низкий

6.9 Medium

CVSS2

Связанные уязвимости

ubuntu
около 13 лет назад

The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.

nvd
около 13 лет назад

The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.

debian
около 13 лет назад

The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib b ...

github
почти 4 года назад

The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.

oracle-oval
около 13 лет назад

ELSA-2013-0568: dbus-glib security update (IMPORTANT)

EPSS

Процентиль: 45%
0.00223
Низкий

6.9 Medium

CVSS2