2 results (0.007 seconds)

CVSS: 7.2EPSS: 0%CPEs: 16EXPL: 3

The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal. La función dbus_g_proxy_manager_filter en dbus-gproxy en Dbus-glib anterior a v0.100.1 no verifica correctamente el emisor de señales NameOwnerChanged, permitiendo a usuarios locales obtener privilegios a través de una señal falsificada. • https://www.exploit-db.com/exploits/33614 http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=911658 http://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 http://osvdb.org/90302 http://rhn.redhat.com/errata/RHSA-2013-0568.html http://secunia.com/advisories/52225 http://secunia.com/advisories/52375 http://secunia.com/advisories/52404 http://www.exploit-db.com/exploits/33614 http&# • CWE-20: Improper Input Validation •

CVSS: 3.6EPSS: 0%CPEs: 1EXPL: 0

DBus-GLib 0.73 disregards the access flag of exported GObject properties, which allows local users to bypass intended access restrictions and possibly cause a denial of service by modifying properties, as demonstrated by properties of the (1) DeviceKit-Power, (2) NetworkManager, and (3) ModemManager services. DBus-GLib v0.73 no tiene en cuenta la bandera de acceso en las propiedades GObject exportadas, lo que permite a usuarios locales evitar restricciones de acceso establecidas y posiblemente provocar una denegación de servicio modificando las propiedades, como es demostrado en las propiedades de los servicios (1) DeviceKit-Power, (2) NetworkManager, y (3) ModemManager. • http://cgit.freedesktop.org/dbus/dbus-glib/commit/?h=rhel5&id=9a6bce9b615abca6068348c1606ba8eaf13d9ae0 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html http://secunia.com/advisories/40908 http://secunia.com/advisories/40925 http://secunia.com/advisories/42397 http:/ • CWE-264: Permissions, Privileges, and Access Controls •