Show filters
85 Total Results
Displaying 61-70 of 85
Sort by:
Attacker Value
Unknown
CVE-2014-3639
Disclosure Date: September 22, 2014 (last updated December 28, 2023)
The dbus-daemon in D-Bus before 1.6.24 and 1.8.x before 1.8.8 does not properly close old connections, which allows local users to cause a denial of service (incomplete connection consumption and prevention of new connections) via a large number of incomplete connections.
0
Attacker Value
Unknown
CVE-2014-3635
Disclosure Date: September 22, 2014 (last updated December 28, 2023)
Off-by-one error in D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8, when running on a 64-bit system and the max_message_unix_fds limit is set to an odd number, allows local users to cause a denial of service (dbus-daemon crash) or possibly execute arbitrary code by sending one more file descriptor than the limit, which triggers a heap-based buffer overflow or an assertion failure.
0
Attacker Value
Unknown
CVE-2014-3637
Disclosure Date: September 22, 2014 (last updated December 28, 2023)
D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 does not properly close connections for processes that have terminated, which allows local users to cause a denial of service via a D-bus message containing a D-Bus connection file descriptor.
0
Attacker Value
Unknown
CVE-2014-3532
Disclosure Date: July 19, 2014 (last updated December 28, 2023)
dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6, when running on Linux 2.6.37-rc4 or later, allows local users to cause a denial of service (system-bus disconnect of other services or applications) by sending a message containing a file descriptor, then exceeding the maximum recursion depth before the initial message is forwarded.
0
Attacker Value
Unknown
CVE-2014-3533
Disclosure Date: July 19, 2014 (last updated December 28, 2023)
dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6 allows local users to cause a denial of service (disconnect) via a certain sequence of crafted messages that cause the dbus-daemon to forward a message containing an invalid file descriptor.
0
Attacker Value
Unknown
CVE-2014-3477
Disclosure Date: July 01, 2014 (last updated December 28, 2023)
The dbus-daemon in D-Bus 1.2.x through 1.4.x, 1.6.x before 1.6.20, and 1.8.x before 1.8.4, sends an AccessDenied error to the service instead of a client when the client is prohibited from accessing the service, which allows local users to cause a denial of service (initialization failure and exit) or possibly conduct a side-channel attack via a D-Bus message to an inactive service.
0
Attacker Value
Unknown
CVE-2013-0662
Disclosure Date: April 01, 2014 (last updated October 05, 2023)
Multiple stack-based buffer overflows in ModbusDrv.exe in Schneider Electric Modbus Serial Driver 1.10 through 3.2 allow remote attackers to execute arbitrary code via a large buffer-size value in a Modbus Application Header.
0
Attacker Value
Unknown
CVE-2013-2168
Disclosure Date: July 03, 2013 (last updated December 28, 2023)
The _dbus_printf_string_upper_bound function in dbus/dbus-sysdeps-unix.c in D-Bus (aka DBus) 1.4.x before 1.4.26, 1.6.x before 1.6.12, and 1.7.x before 1.7.4 allows local users to cause a denial of service (service crash) via a crafted message.
0
Attacker Value
Unknown
CVE-2013-0292
Disclosure Date: March 05, 2013 (last updated October 05, 2023)
The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
0
Attacker Value
Unknown
CVE-2012-3524
Disclosure Date: September 18, 2012 (last updated November 08, 2023)
libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X.org and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable. NOTE: libdbus maintainers state that this is a vulnerability in the applications that do not cleanse environment variables, not in libdbus itself: "we do not support use of libdbus in setuid binaries that do not sanitize their environment before their first call into libdbus."
0