Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-6560

Опубликовано: 29 янв. 2018
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

In dbus-proxy/flatpak-proxy.c in Flatpak before 0.8.9, and 0.9.x and 0.10.x before 0.10.3, crafted D-Bus messages to the host can be used to break out of the sandbox, because whitespace handling in the proxy is not identical to whitespace handling in the daemon.

It was found that flatpak's D-Bus proxy did not properly filter the access to D-Bus during the authentication protocol. A specially crafted flatpak application could use this flaw to bypass all restrictions imposed by flatpak and have full access to the D-BUS interface.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8flatpakNot affected
Red Hat Enterprise Linux 7flatpakFixedRHSA-2018:276625.09.2018

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-270
https://bugzilla.redhat.com/show_bug.cgi?id=1542207flatpak: sandbox escape in D-Bus filtering by a crafted authentication handshake

EPSS

Процентиль: 27%
0.00094
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 8 лет назад

In dbus-proxy/flatpak-proxy.c in Flatpak before 0.8.9, and 0.9.x and 0.10.x before 0.10.3, crafted D-Bus messages to the host can be used to break out of the sandbox, because whitespace handling in the proxy is not identical to whitespace handling in the daemon.

CVSS3: 8.8
nvd
почти 8 лет назад

In dbus-proxy/flatpak-proxy.c in Flatpak before 0.8.9, and 0.9.x and 0.10.x before 0.10.3, crafted D-Bus messages to the host can be used to break out of the sandbox, because whitespace handling in the proxy is not identical to whitespace handling in the daemon.

CVSS3: 8.8
debian
почти 8 лет назад

In dbus-proxy/flatpak-proxy.c in Flatpak before 0.8.9, and 0.9.x and 0 ...

CVSS3: 8.8
github
больше 3 лет назад

In dbus-proxy/flatpak-proxy.c in Flatpak before 0.8.9, and 0.9.x and 0.10.x before 0.10.3, crafted D-Bus messages to the host can be used to break out of the sandbox, because whitespace handling in the proxy is not identical to whitespace handling in the daemon.

oracle-oval
около 7 лет назад

ELSA-2018-2766: flatpak security update (MODERATE)

EPSS

Процентиль: 27%
0.00094
Низкий

6.5 Medium

CVSS3