ArchLinux: 201906-16: dbus: access restriction bypass

    Date19 Jun 2019
    CategoryArchLinux
    497
    Posted ByLinuxSecurity Advisories
    The package dbus before version 1.12.16-1 is vulnerable to access restriction bypass.
    Arch Linux Security Advisory ASA-201906-16
    ==========================================
    
    Severity: High
    Date    : 2019-06-18
    CVE-ID  : CVE-2019-12749
    Package : dbus
    Type    : access restriction bypass
    Remote  : No
    Link    : https://security.archlinux.org/AVG-974
    
    Summary
    =======
    
    The package dbus before version 1.12.16-1 is vulnerable to access
    restriction bypass.
    
    Resolution
    ==========
    
    Upgrade to 1.12.16-1.
    
    # pacman -Syu "dbus>=1.12.16-1"
    
    The problem has been fixed upstream in version 1.12.16.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    It has been discovered that dbus before 1.12.16 allows cookie spoofing
    because of symlink mishandling in the reference implementation of
    DBUS_COOKIE_SHA1 in the libdbus library. This issue only affects the
    DBUS_COOKIE_SHA1 authentication mechanism.
    A malicious client with write access to its own home directory could
    manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a
    different uid to read and write in unintended locations. In the worst
    case, this could result in the DBusServer reusing a cookie that is
    known to the malicious client, and treating that cookie as evidence
    that a subsequent client connection came from an attacker-chosen uid,
    allowing authentication bypass.
    
    Impact
    ======
    
    A local attacker could use this issue to bypass authentication and
    escalate privileges.
    
    References
    ==========
    
    https://www.openwall.com/lists/oss-security/2019/06/11/2
    https://gitlab.freedesktop.org/dbus/dbus/issues/269
    https://gitlab.freedesktop.org/dbus/dbus/commit/47b1a4c41004bf494b87370987b222c934b19016
    https://security.archlinux.org/CVE-2019-12749
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"15","type":"x","order":"1","pct":53.57,"resources":[]},{"id":"88","title":"Should be more technical","votes":"4","type":"x","order":"2","pct":14.29,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"9","type":"x","order":"3","pct":32.14,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.