CVE-2013-0292

The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
References
Link Resource
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=911658
http://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca Exploit Patch
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://osvdb.org/90302
http://rhn.redhat.com/errata/RHSA-2013-0568.html
http://secunia.com/advisories/52225 Vendor Advisory
http://secunia.com/advisories/52375
http://secunia.com/advisories/52404 Vendor Advisory
http://www.exploit-db.com/exploits/33614
http://www.mandriva.com/security/advisories?name=MDVSA-2013:071
http://www.openwall.com/lists/oss-security/2013/02/15/10
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/57985
http://www.ubuntu.com/usn/USN-1753-1
https://bugs.freedesktop.org/show_bug.cgi?id=60916
https://exchange.xforce.ibmcloud.com/vulnerabilities/82135
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=911658
http://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca Exploit Patch
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://osvdb.org/90302
http://rhn.redhat.com/errata/RHSA-2013-0568.html
http://secunia.com/advisories/52225 Vendor Advisory
http://secunia.com/advisories/52375
http://secunia.com/advisories/52404 Vendor Advisory
http://www.exploit-db.com/exploits/33614
http://www.mandriva.com/security/advisories?name=MDVSA-2013:071
http://www.openwall.com/lists/oss-security/2013/02/15/10
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/57985
http://www.ubuntu.com/usn/USN-1753-1
https://bugs.freedesktop.org/show_bug.cgi?id=60916
https://exchange.xforce.ibmcloud.com/vulnerabilities/82135
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:freedesktop:dbus-glib:*:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.72:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.73:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.74:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.76:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.78:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.80:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.82:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.84:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.86:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.88:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.90:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.92:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.94:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.96:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.98:*:*:*:*:*:*:*

History

21 Nov 2024, 01:47

Type Values Removed Values Added
References () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=911658 - () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=911658 -
References () http://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca - Exploit, Patch () http://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca - Exploit, Patch
References () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 - () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 -
References () http://osvdb.org/90302 - () http://osvdb.org/90302 -
References () http://rhn.redhat.com/errata/RHSA-2013-0568.html - () http://rhn.redhat.com/errata/RHSA-2013-0568.html -
References () http://secunia.com/advisories/52225 - Vendor Advisory () http://secunia.com/advisories/52225 - Vendor Advisory
References () http://secunia.com/advisories/52375 - () http://secunia.com/advisories/52375 -
References () http://secunia.com/advisories/52404 - Vendor Advisory () http://secunia.com/advisories/52404 - Vendor Advisory
References () http://www.exploit-db.com/exploits/33614 - () http://www.exploit-db.com/exploits/33614 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2013:071 - () http://www.mandriva.com/security/advisories?name=MDVSA-2013:071 -
References () http://www.openwall.com/lists/oss-security/2013/02/15/10 - () http://www.openwall.com/lists/oss-security/2013/02/15/10 -
References () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -
References () http://www.securityfocus.com/bid/57985 - () http://www.securityfocus.com/bid/57985 -
References () http://www.ubuntu.com/usn/USN-1753-1 - () http://www.ubuntu.com/usn/USN-1753-1 -
References () https://bugs.freedesktop.org/show_bug.cgi?id=60916 - () https://bugs.freedesktop.org/show_bug.cgi?id=60916 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/82135 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/82135 -

Information

Published : 2013-03-05 21:38

Updated : 2024-11-21 01:47


NVD link : CVE-2013-0292

Mitre link : CVE-2013-0292

CVE.ORG link : CVE-2013-0292


JSON object : View

Products Affected

freedesktop

  • dbus-glib
CWE
CWE-20

Improper Input Validation