1.9
CVSSv2

CVE-2014-3636

Published: 25/10/2014 Updated: 27/12/2023
CVSS v2 Base Score: 1.9 | Impact Score: 2.9 | Exploitability Score: 3.4
VMScore: 169
Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

D-Bus 1.3.0 up to and including 1.6.x prior to 1.6.24 and 1.8.x prior to 1.8.8 allows local users to (1) cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors or (2) cause a denial of service (disconnect) via multiple messages that combine to have more than the allowed number of file descriptors for a single sendmsg call.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

d-bus project d-bus

freedesktop dbus 1.8.0

freedesktop dbus 1.8.6

freedesktop dbus 1.8.4

freedesktop dbus 1.8.2

opensuse opensuse 12.3

Vendor Advisories

Several security issues were fixed in DBus ...
Simon McVittie discovered that the fix for CVE-2014-3636 was incorrect, as it did not fully address the underlying denial-of-service vector This update starts the D-Bus daemon as root initially, so that it can properly raise its file descriptor count In addition, this update reverts the auth_timeout change in the previous security update to its o ...
Alban Crequy and Simon McVittie discovered several vulnerabilities in the D-Bus message daemon CVE-2014-3635 On 64-bit platforms, file descriptor passing could be abused by local users to cause heap corruption in dbus-daemon, leading to a crash, or potentially to arbitrary code execution CVE-2014-3636 A denial-of-service vulnerab ...
D-Bus 130 through 16x before 1624 and 18x before 188 allows local users to (1) cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors or (2) cause a denial of service (disconnect) via multiple messages that combine to have more than the allowed number of file descrip ...