CVE-2013-0292

The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
References
Link Resource
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=911658
http://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca Exploit Patch
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://osvdb.org/90302
http://rhn.redhat.com/errata/RHSA-2013-0568.html
http://secunia.com/advisories/52225 Vendor Advisory
http://secunia.com/advisories/52375
http://secunia.com/advisories/52404 Vendor Advisory
http://www.exploit-db.com/exploits/33614
http://www.mandriva.com/security/advisories?name=MDVSA-2013:071
http://www.openwall.com/lists/oss-security/2013/02/15/10
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/57985
http://www.ubuntu.com/usn/USN-1753-1
https://bugs.freedesktop.org/show_bug.cgi?id=60916
https://exchange.xforce.ibmcloud.com/vulnerabilities/82135
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=911658
http://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca Exploit Patch
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://osvdb.org/90302
http://rhn.redhat.com/errata/RHSA-2013-0568.html
http://secunia.com/advisories/52225 Vendor Advisory
http://secunia.com/advisories/52375
http://secunia.com/advisories/52404 Vendor Advisory
http://www.exploit-db.com/exploits/33614
http://www.mandriva.com/security/advisories?name=MDVSA-2013:071
http://www.openwall.com/lists/oss-security/2013/02/15/10
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/57985
http://www.ubuntu.com/usn/USN-1753-1
https://bugs.freedesktop.org/show_bug.cgi?id=60916
https://exchange.xforce.ibmcloud.com/vulnerabilities/82135
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:freedesktop:dbus-glib:*:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.72:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.73:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.74:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.76:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.78:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.80:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.82:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.84:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.86:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.88:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.90:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.92:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.94:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.96:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus-glib:0.98:*:*:*:*:*:*:*

History

No history.

Information

Published : 2013-03-05 21:38

Updated : 2025-04-11 00:51


NVD link : CVE-2013-0292

Mitre link : CVE-2013-0292

CVE.ORG link : CVE-2013-0292


JSON object : View

Products Affected

freedesktop

  • dbus-glib
CWE
CWE-20

Improper Input Validation