The D-Bus security policy files in /etc/dbus-1/system.d/*.conf in fso-gsmd 0.12.0-3, fso-frameworkd 0.9.5.9+git20110512-4, and fso-usaged 0.12.0-2 as packaged in Debian, the upstream cornucopia.git (fsoaudiod, fsodatad, fsodeviced, fsogsmd, fsonetworkd, fsotdld, fsousaged) git master on 2015-01-19, the upstream framework.git 0.10.1 and git master on 2015-01-19, phonefsod 0.1+git20121018-1 as packaged in Debian, Ubuntu and potentially other packages, and potentially other fso modules do not properly filter D-Bus message paths, which might allow local users to cause a denial of service (dbus-daemon memory consumption), or execute arbitrary code as root by sending a crafted D-Bus message to any D-Bus system service.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/72363 | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2015/01/27/25 | Mailing List Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/100488 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2017-09-25 18:29
Updated : 2017-10-11 12:23
NVD link : CVE-2014-8156
Mitre link : CVE-2014-8156
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
fso-gsmd_project
- fso-gsmd
fso-usaged_project
- fso-usaged
phonefsod_project
- phonefsod
fso-frameworkd_project
- fso-frameworkd
debian
- debian_linux