CVE-2023-34969
dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.
D-Bus en versiones anteriores a v1.15.6 a veces permite a usuarios sin privilegios bloquear el "dbus-daemon". Si un usuario privilegiado con control sobre "dbus-daemon" está usando la interfaz "org.freedesktop.DBus.Monitoring" para monitorizar el tráfico del bus de mensajes, entonces un usuario sin privilegios con la capacidad de conectarse al mismo "dbus-daemon" puede causar un fallo del "dbus-daemon" bajo algunas circunstancias a través de un mensaje sin respuesta. Cuando se hace en el bus del sistema conocido, se trata de una vulnerabilidad de denegación de servicio. Las versiones que corrigen esta vulnerabilidad son v1.12.28, v1.14.8 y v1.15.6.
An assertion failure vulnerability was found in D-Bus. This issue occurs when a privileged monitoring connection (dbus-monitor, busctl monitor, gdbus monitor, or similar) is active, and a message from the bus driver cannot be delivered to a client connection due to <deny> rules or outgoing message quota. If a privileged user with control over the dbus-daemon is monitoring the message bus traffic using the Monitoring clients like the dbus-monitor or busctl monitor interfaces, then an unprivileged local user with the ability to connect to the same dbus-daemon could send specially crafted request, causing a dbus-daemon to crash, resulting in a denial of service under some circumstances.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-06-08 CVE Reserved
- 2023-06-08 CVE Published
- 2024-06-14 EPSS Updated
- 2024-08-02 CVE Updated
- 2024-08-02 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-617: Reachable Assertion
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2023/10/msg00033.html | Mailing List | |
https://security.netapp.com/advisory/ntap-20231208-0007 |
URL | Date | SRC |
---|---|---|
https://gitlab.freedesktop.org/dbus/dbus/-/issues/457 | 2024-08-02 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Freedesktop Search vendor "Freedesktop" | Dbus Search vendor "Freedesktop" for product "Dbus" | >= 1.12.0 < 1.12.28 Search vendor "Freedesktop" for product "Dbus" and version " >= 1.12.0 < 1.12.28" | - |
Affected
| ||||||
Freedesktop Search vendor "Freedesktop" | Dbus Search vendor "Freedesktop" for product "Dbus" | >= 1.14.0 < 1.14.8 Search vendor "Freedesktop" for product "Dbus" and version " >= 1.14.0 < 1.14.8" | - |
Affected
| ||||||
Freedesktop Search vendor "Freedesktop" | Dbus Search vendor "Freedesktop" for product "Dbus" | >= 1.15.0 < 1.15.6 Search vendor "Freedesktop" for product "Dbus" and version " >= 1.15.0 < 1.15.6" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 38 Search vendor "Fedoraproject" for product "Fedora" and version "38" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
|