2.1
CVSSv2

CVE-2014-3638

Published: 22/09/2014 Updated: 27/12/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The bus_connections_check_reply function in config-parser.c in D-Bus prior to 1.6.24 and 1.8.x prior to 1.8.8 allows local users to cause a denial of service (CPU consumption) via a large number of method calls.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

d-bus project d-bus

freedesktop dbus 1.6.4

freedesktop dbus 1.6.0

freedesktop dbus 1.8.0

freedesktop dbus 1.6.20

freedesktop dbus 1.6.10

freedesktop dbus 1.6.12

freedesktop dbus 1.6.16

freedesktop dbus 1.6.8

freedesktop dbus 1.6.14

freedesktop dbus 1.6.6

freedesktop dbus 1.8.6

freedesktop dbus 1.6.18

freedesktop dbus 1.8.4

freedesktop dbus 1.8.2

freedesktop dbus 1.6.2

opensuse opensuse 12.3

Vendor Advisories

Several security issues were fixed in DBus ...
Alban Crequy and Simon McVittie discovered several vulnerabilities in the D-Bus message daemon CVE-2014-3635 On 64-bit platforms, file descriptor passing could be abused by local users to cause heap corruption in dbus-daemon, leading to a crash, or potentially to arbitrary code execution CVE-2014-3636 A denial-of-service vulnerab ...
The bus_connections_check_reply function in config-parserc in D-Bus before 1624 and 18x before 188 allows local users to cause a denial of service (CPU consumption) via a large number of method calls ...