Логотип exploitDog
bind:CVE-2019-12749
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-12749

Количество 21

Количество 21

ubuntu логотип

CVE-2019-12749

больше 6 лет назад

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.

CVSS3: 7.1
EPSS: Низкий
redhat логотип

CVE-2019-12749

больше 6 лет назад

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2019-12749

больше 6 лет назад

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.

CVSS3: 7.1
EPSS: Низкий
msrc логотип

CVE-2019-12749

больше 5 лет назад

dbus before 1.10.28 1.12.x before 1.12.16 and 1.13.x before 1.13.12 as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some less common uses of dbus-daemon) allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case this could result in the DBusServer reusing a cookie that is known to the malicious client and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid allowing authentication bypass.

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2019-12749

больше 6 лет назад

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, ...

CVSS3: 7.1
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1750-1

больше 6 лет назад

Security update for dbus-1

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1671-1

больше 6 лет назад

Security update for dbus-1

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1604-1

больше 6 лет назад

Security update for dbus-1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1672-1

больше 5 лет назад

Security update for dbus-1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2820-2

почти 6 лет назад

Security update for dbus-1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2820-1

больше 6 лет назад

Security update for dbus-1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1597-1

больше 6 лет назад

Security update for dbus-1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1595-1

больше 6 лет назад

Security update for dbus-1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1591-1

больше 6 лет назад

Security update for dbus-1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1521-1

больше 6 лет назад

Security update for dbus-1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:14111-1

больше 6 лет назад

Security update for dbus-1

EPSS: Низкий
github логотип

GHSA-2hpj-v4f4-7g4j

больше 3 лет назад

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.

CVSS3: 7.1
EPSS: Низкий
oracle-oval логотип

ELSA-2020-4032

больше 5 лет назад

ELSA-2020-4032: dbus security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-3707

около 6 лет назад

ELSA-2019-3707: dbus security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-1726

больше 6 лет назад

ELSA-2019-1726: dbus security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-12749

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.

CVSS3: 7.1
0%
Низкий
больше 6 лет назад
redhat логотип
CVE-2019-12749

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.

CVSS3: 7
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-12749

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.

CVSS3: 7.1
0%
Низкий
больше 6 лет назад
msrc логотип
CVE-2019-12749

dbus before 1.10.28 1.12.x before 1.12.16 and 1.13.x before 1.13.12 as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some less common uses of dbus-daemon) allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case this could result in the DBusServer reusing a cookie that is known to the malicious client and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid allowing authentication bypass.

CVSS3: 7.1
0%
Низкий
больше 5 лет назад
debian логотип
CVE-2019-12749

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, ...

CVSS3: 7.1
0%
Низкий
больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1750-1

Security update for dbus-1

0%
Низкий
больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1671-1

Security update for dbus-1

0%
Низкий
больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1604-1

Security update for dbus-1

0%
Низкий
больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:1672-1

Security update for dbus-1

0%
Низкий
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:2820-2

Security update for dbus-1

0%
Низкий
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2820-1

Security update for dbus-1

0%
Низкий
больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1597-1

Security update for dbus-1

0%
Низкий
больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1595-1

Security update for dbus-1

0%
Низкий
больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1591-1

Security update for dbus-1

0%
Низкий
больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1521-1

Security update for dbus-1

0%
Низкий
больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:14111-1

Security update for dbus-1

0%
Низкий
больше 6 лет назад
github логотип
GHSA-2hpj-v4f4-7g4j

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.

CVSS3: 7.1
0%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2020-4032

ELSA-2020-4032: dbus security update (MODERATE)

больше 5 лет назад
oracle-oval логотип
ELSA-2019-3707

ELSA-2019-3707: dbus security update (MODERATE)

около 6 лет назад
oracle-oval логотип
ELSA-2019-1726

ELSA-2019-1726: dbus security update (IMPORTANT)

больше 6 лет назад

Уязвимостей на страницу