Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2023-34969
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-08 Jun, 2023 | 03:15
Updated At-09 Jun, 2025 | 15:15

D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Secondary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CPE Matches

freedesktop.org
freedesktop
>>dbus>>Versions from 1.12.0(inclusive) to 1.12.28(exclusive)
cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*
freedesktop.org
freedesktop
>>dbus>>Versions from 1.14.0(inclusive) to 1.14.8(exclusive)
cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*
freedesktop.org
freedesktop
>>dbus>>Versions from 1.15.0(inclusive) to 1.15.6(exclusive)
cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>38
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>10.0
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE-404Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://gitlab.freedesktop.org/dbus/dbus/-/issues/457cve@mitre.org
Exploit
Issue Tracking
Mitigation
Patch
Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/10/msg00033.htmlcve@mitre.org
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/cve@mitre.org
Mailing List
Third Party Advisory
https://security.netapp.com/advisory/ntap-20231208-0007/cve@mitre.org
N/A
https://gitlab.freedesktop.org/dbus/dbus/-/issues/457af854a3a-2127-422b-91ae-364da2661108
Exploit
Issue Tracking
Mitigation
Patch
Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/10/msg00033.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://security.netapp.com/advisory/ntap-20231208-0007/af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found