1 results (0.005 seconds)

CVSS: 6.9EPSS: 0%CPEs: 7EXPL: 4

libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X.org and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable. NOTE: libdbus maintainers state that this is a vulnerability in the applications that do not cleanse environment variables, not in libdbus itself: "we do not support use of libdbus in setuid binaries that do not sanitize their environment before their first call into libdbus." Protección v1.5.x y anteriores, cuan es usado con setuid u otros programas con privilegios en X.org y posiblemente otros productos, permite a usuarios locales elevar sus privilegios y ejecutar código de su elección a través de la variable de entorno DBUS_SYSTEM_BUS_ADDRESS environment. NOTA: el equipo de mantenimiento de lindbus indican que esto es un problema de las aplicaciones que no limpian las variables de entorno, no en del propio lindbus. • https://www.exploit-db.com/exploits/21323 http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00000.html http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html http://rhn.redhat.com/errata/RHSA-2012-1261.html http://secunia.com/advisories/50537 http://secunia.com/advisories/50544 http://secunia.com/advisories/50710 htt • CWE-264: Permissions, Privileges, and Access Controls CWE-426: Untrusted Search Path •