|
Family: Ubuntu Local Security Checks --> Category: infos
USN144-1 : dbus vulnerability Vulnerability Scan
Vulnerability Scan Summary dbus vulnerability
Detailed Explanation for this Vulnerability Test
Synopsis :
These remote packages are missing security patches :
- dbus-1
- dbus-1-dev
- dbus-1-doc
- dbus-1-utils
- dbus-glib-1
- dbus-glib-1-dev
- python2.3-dbus
Description :
Besides providing the global system-wide communication bus, dbus also
offers per-user "session" buses which applications in an user's
session can create and use to communicate with each other. Daniel
Reed discovered that the default configuration of the session dbus
allowed a local user to connect to another user's session bus if its
address was known. The fixed packages restrict the default permissions
to the user who owns the session dbus instance.
Please note that a standard Ubuntu installation does not use the
session bus for anything, so this can only be exploited if you are
using custom software which uses it.
Solution :
Upgrade to :
- dbus-1-0.22-1ubuntu2.1 (Ubuntu 4.10)
- dbus-1-dev-0.22-1ubuntu2.1 (Ubuntu 4.10)
- dbus-1-doc-0.22-1ubuntu2.1 (Ubuntu 4.10)
- dbus-1-utils-0.22-1ubuntu2.1 (Ubuntu 4.10)
- dbus-glib-1-0.22-1ubuntu2.1 (Ubuntu 4.10)
- dbus-glib-1-dev-0.22-1ubuntu2.1 (Ubuntu 4.10)
- python2.3-dbus-0.22-1ubuntu2.1 (Ubuntu 4.10)
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|