CVE-2014-3532

dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6, when running on Linux 2.6.37-rc4 or later, allows local users to cause a denial of service (system-bus disconnect of other services or applications) by sending a message containing a file descriptor, then exceeding the maximum recursion depth before the initial message is forwarded.
References
Link Resource
http://advisories.mageia.org/MGASA-2014-0294.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2014/07/02/4 Mailing List Third Party Advisory
http://secunia.com/advisories/59611 Third Party Advisory
http://secunia.com/advisories/59798 Third Party Advisory
http://secunia.com/advisories/60236 Third Party Advisory
http://www.debian.org/security/2014/dsa-2971 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html Third Party Advisory
https://bugs.freedesktop.org/show_bug.cgi?id=80163 Issue Tracking Patch Third Party Advisory
http://advisories.mageia.org/MGASA-2014-0294.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2014/07/02/4 Mailing List Third Party Advisory
http://secunia.com/advisories/59611 Third Party Advisory
http://secunia.com/advisories/59798 Third Party Advisory
http://secunia.com/advisories/60236 Third Party Advisory
http://www.debian.org/security/2014/dsa-2971 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html Third Party Advisory
https://bugs.freedesktop.org/show_bug.cgi?id=80163 Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*
OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.37:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.37:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.37:rc8:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*

History

21 Nov 2024, 02:08

Type Values Removed Values Added
References () http://advisories.mageia.org/MGASA-2014-0294.html - Third Party Advisory () http://advisories.mageia.org/MGASA-2014-0294.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html - Mailing List, Third Party Advisory
References () http://openwall.com/lists/oss-security/2014/07/02/4 - Mailing List, Third Party Advisory () http://openwall.com/lists/oss-security/2014/07/02/4 - Mailing List, Third Party Advisory
References () http://secunia.com/advisories/59611 - Third Party Advisory () http://secunia.com/advisories/59611 - Third Party Advisory
References () http://secunia.com/advisories/59798 - Third Party Advisory () http://secunia.com/advisories/59798 - Third Party Advisory
References () http://secunia.com/advisories/60236 - Third Party Advisory () http://secunia.com/advisories/60236 - Third Party Advisory
References () http://www.debian.org/security/2014/dsa-2971 - Third Party Advisory () http://www.debian.org/security/2014/dsa-2971 - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 - Third Party Advisory () http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 - Third Party Advisory
References () http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html - Third Party Advisory
References () https://bugs.freedesktop.org/show_bug.cgi?id=80163 - Issue Tracking, Patch, Third Party Advisory () https://bugs.freedesktop.org/show_bug.cgi?id=80163 - Issue Tracking, Patch, Third Party Advisory

27 Dec 2023, 16:36

Type Values Removed Values Added
First Time Freedesktop dbus
Freedesktop
CPE cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*

Information

Published : 2014-07-19 19:55

Updated : 2024-11-21 02:08


NVD link : CVE-2014-3532

Mitre link : CVE-2014-3532

CVE.ORG link : CVE-2014-3532


JSON object : View

Products Affected

oracle

  • solaris

linux

  • linux_kernel

mageia

  • mageia

opensuse

  • opensuse

freedesktop

  • dbus

debian

  • debian_linux
CWE
CWE-20

Improper Input Validation