Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2009-1189
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
The _dbus_validate_signature_with_reason function (dbus-marshal-validate.c) in D-Bus (aka DBus) before 1.2.14 uses incorrect logic to validate a basic type, which allows remote attackers to spoof a signature via a crafted key. NOTE: this is due to an incorrect fix for CVE-2008-3834..
CVSSv2.0 Score
- Severity
- Low
- Base Score
- 3.6/10
- Exploit Score
- 3.9/10
- Access Vector
- Local
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 4.9/10
- Confidentiality Impact
- None
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:freedesktop:dbus:0.13:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.60:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:1.1.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.34:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.92:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.50:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.35.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.36.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.33:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:1.0:rc1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.10:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:1.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.11:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:1.1.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:1.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:1.1.20:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.9:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:1.2.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.23.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.35:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.91:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.36:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.32:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:1.0:rc3:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.22:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:1.1.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.61:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.21:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.35.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.23.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.20:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:1.0:rc2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.62:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.23.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.12:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.90:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:1.1.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.36.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.23:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:freedesktop:dbus:0.31:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://bugs.freedesktop.org/show_bug.cgi?id=17803
- http://www.openwall.com/lists/oss-security/2009/04/16/13
- http://www.securityfocus.com/bid/31602
- http://secunia.com/advisories/32127
- http://www.freedesktop.org/wiki/Software/dbus#head-dad0dab297a44f1d7a3b1259cfc06b583fd6a
- http://secunia.com/advisories/35810
- https://rhn.redhat.com/errata/RHSA-2010-0095.html
- http://secunia.com/advisories/38794
- http://www.vupen.com/english/advisories/2010/0528
- http://lists.vmware.com/pipermail/security-announce/2010/000082.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50385
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1
- https://usn.ubuntu.com/799-1/