dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6, when running on Linux 2.6.37-rc4 or later, allows local users to cause a denial of service (system-bus disconnect of other services or applications) by sending a message containing a file descriptor, then exceeding the maximum recursion depth before the initial message is forwarded.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6, when running on Linux 2.6.37-rc4 or later, allows local users to cause a denial of service (system-bus disconnect of other services or applications) by sending a message containing a file descriptor, then exceeding the maximum recursion depth before the initial message is forwarded.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://secunia.com/advisories/59798 | third-party-advisory x_refsource_SECUNIA |
http://secunia.com/advisories/59611 | third-party-advisory x_refsource_SECUNIA |
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html | vendor-advisory x_refsource_SUSE |
http://secunia.com/advisories/60236 | third-party-advisory x_refsource_SECUNIA |
http://advisories.mageia.org/MGASA-2014-0294.html | x_refsource_CONFIRM |
https://bugs.freedesktop.org/show_bug.cgi?id=80163 | x_refsource_CONFIRM |
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | x_refsource_CONFIRM |
http://www.debian.org/security/2014/dsa-2971 | vendor-advisory x_refsource_DEBIAN |
http://openwall.com/lists/oss-security/2014/07/02/4 | mailing-list x_refsource_MLIST |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 | vendor-advisory x_refsource_MANDRIVA |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://secunia.com/advisories/59798 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/59611 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html | vendor-advisory x_refsource_SUSE x_transferred |
http://secunia.com/advisories/60236 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://advisories.mageia.org/MGASA-2014-0294.html | x_refsource_CONFIRM x_transferred |
https://bugs.freedesktop.org/show_bug.cgi?id=80163 | x_refsource_CONFIRM x_transferred |
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | x_refsource_CONFIRM x_transferred |
http://www.debian.org/security/2014/dsa-2971 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://openwall.com/lists/oss-security/2014/07/02/4 | mailing-list x_refsource_MLIST x_transferred |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 | vendor-advisory x_refsource_MANDRIVA x_transferred |
dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6, when running on Linux 2.6.37-rc4 or later, allows local users to cause a denial of service (system-bus disconnect of other services or applications) by sending a message containing a file descriptor, then exceeding the maximum recursion depth before the initial message is forwarded.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 2.1 | LOW | AV:L/AC:L/Au:N/C:N/I:N/A:P |
Hyperlink | Source | Resource |
---|---|---|
http://advisories.mageia.org/MGASA-2014-0294.html | secalert@redhat.com | Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html | secalert@redhat.com | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2014/07/02/4 | secalert@redhat.com | Mailing List Third Party Advisory |
http://secunia.com/advisories/59611 | secalert@redhat.com | Third Party Advisory |
http://secunia.com/advisories/59798 | secalert@redhat.com | Third Party Advisory |
http://secunia.com/advisories/60236 | secalert@redhat.com | Third Party Advisory |
http://www.debian.org/security/2014/dsa-2971 | secalert@redhat.com | Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 | secalert@redhat.com | Third Party Advisory |
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | secalert@redhat.com | Third Party Advisory |
https://bugs.freedesktop.org/show_bug.cgi?id=80163 | secalert@redhat.com | Issue Tracking Patch Third Party Advisory |
http://advisories.mageia.org/MGASA-2014-0294.html | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2014/07/02/4 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://secunia.com/advisories/59611 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://secunia.com/advisories/59798 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://secunia.com/advisories/60236 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://www.debian.org/security/2014/dsa-2971 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
https://bugs.freedesktop.org/show_bug.cgi?id=80163 | af854a3a-2127-422b-91ae-364da2661108 | Issue Tracking Patch Third Party Advisory |