CVE-2014-3532

dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6, when running on Linux 2.6.37-rc4 or later, allows local users to cause a denial of service (system-bus disconnect of other services or applications) by sending a message containing a file descriptor, then exceeding the maximum recursion depth before the initial message is forwarded.
References
Link Resource
http://advisories.mageia.org/MGASA-2014-0294.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2014/07/02/4 Mailing List Third Party Advisory
http://secunia.com/advisories/59611 Third Party Advisory
http://secunia.com/advisories/59798 Third Party Advisory
http://secunia.com/advisories/60236 Third Party Advisory
http://www.debian.org/security/2014/dsa-2971 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html Third Party Advisory
https://bugs.freedesktop.org/show_bug.cgi?id=80163 Issue Tracking Patch Third Party Advisory
http://advisories.mageia.org/MGASA-2014-0294.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2014/07/02/4 Mailing List Third Party Advisory
http://secunia.com/advisories/59611 Third Party Advisory
http://secunia.com/advisories/59798 Third Party Advisory
http://secunia.com/advisories/60236 Third Party Advisory
http://www.debian.org/security/2014/dsa-2971 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html Third Party Advisory
https://bugs.freedesktop.org/show_bug.cgi?id=80163 Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:*
OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.37:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.37:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.37:rc8:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*

History

No history.

Information

Published : 2014-07-19 19:55

Updated : 2025-04-12 10:46


NVD link : CVE-2014-3532

Mitre link : CVE-2014-3532

CVE.ORG link : CVE-2014-3532


JSON object : View

Products Affected

opensuse

  • opensuse

oracle

  • solaris

debian

  • debian_linux

mageia

  • mageia

freedesktop

  • dbus

linux

  • linux_kernel
CWE
CWE-20

Improper Input Validation