ArchLinux: 201906-16: dbus: access restriction bypass

    Date 19 Jun 2019
    725
    Posted By LinuxSecurity Advisories
    The package dbus before version 1.12.16-1 is vulnerable to access restriction bypass.
    Arch Linux Security Advisory ASA-201906-16
    ==========================================
    
    Severity: High
    Date    : 2019-06-18
    CVE-ID  : CVE-2019-12749
    Package : dbus
    Type    : access restriction bypass
    Remote  : No
    Link    : https://security.archlinux.org/AVG-974
    
    Summary
    =======
    
    The package dbus before version 1.12.16-1 is vulnerable to access
    restriction bypass.
    
    Resolution
    ==========
    
    Upgrade to 1.12.16-1.
    
    # pacman -Syu "dbus>=1.12.16-1"
    
    The problem has been fixed upstream in version 1.12.16.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    It has been discovered that dbus before 1.12.16 allows cookie spoofing
    because of symlink mishandling in the reference implementation of
    DBUS_COOKIE_SHA1 in the libdbus library. This issue only affects the
    DBUS_COOKIE_SHA1 authentication mechanism.
    A malicious client with write access to its own home directory could
    manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a
    different uid to read and write in unintended locations. In the worst
    case, this could result in the DBusServer reusing a cookie that is
    known to the malicious client, and treating that cookie as evidence
    that a subsequent client connection came from an attacker-chosen uid,
    allowing authentication bypass.
    
    Impact
    ======
    
    A local attacker could use this issue to bypass authentication and
    escalate privileges.
    
    References
    ==========
    
    https://www.openwall.com/lists/oss-security/2019/06/11/2
    https://gitlab.freedesktop.org/dbus/dbus/issues/269
    https://gitlab.freedesktop.org/dbus/dbus/commit/47b1a4c41004bf494b87370987b222c934b19016
    https://security.archlinux.org/CVE-2019-12749
    
    

    LinuxSecurity Poll

    What do you think of the LinuxSecurity Privacy news articles?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/25-what-do-you-think-of-the-linuxsecurity-privacy-news-articles?task=poll.vote&format=json
    25
    radio
    [{"id":"90","title":"Love them!","votes":"97","type":"x","order":"1","pct":80.17,"resources":[]},{"id":"91","title":"I'm indifferent","votes":"18","type":"x","order":"2","pct":14.88,"resources":[]},{"id":"92","title":"Not interested in this topic","votes":"6","type":"x","order":"3","pct":4.96,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.