CVE-2011-2200

The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct unspecified state-modification attacks via crafted messages.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629938
http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.2&id=6519a1f77c61d753d4c97efd6e15630eb275336e Patch
http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 Patch
http://cgit.freedesktop.org/dbus/dbus/tree/NEWS?h=dbus-1.2 Patch
http://cgit.freedesktop.org/dbus/dbus/tree/NEWS?h=dbus-1.4
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
http://lists.freedesktop.org/archives/dbus/2011-May/014408.html
http://openwall.com/lists/oss-security/2011/06/12/1 Patch
http://openwall.com/lists/oss-security/2011/06/12/2
http://openwall.com/lists/oss-security/2011/06/13/12 Patch
http://secunia.com/advisories/44896 Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2011-1132.html
https://bugs.freedesktop.org/show_bug.cgi?id=38120
https://bugzilla.redhat.com/show_bug.cgi?id=712676 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/67974
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629938
http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.2&id=6519a1f77c61d753d4c97efd6e15630eb275336e Patch
http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 Patch
http://cgit.freedesktop.org/dbus/dbus/tree/NEWS?h=dbus-1.2 Patch
http://cgit.freedesktop.org/dbus/dbus/tree/NEWS?h=dbus-1.4
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
http://lists.freedesktop.org/archives/dbus/2011-May/014408.html
http://openwall.com/lists/oss-security/2011/06/12/1 Patch
http://openwall.com/lists/oss-security/2011/06/12/2
http://openwall.com/lists/oss-security/2011/06/13/12 Patch
http://secunia.com/advisories/44896 Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2011-1132.html
https://bugs.freedesktop.org/show_bug.cgi?id=38120
https://bugzilla.redhat.com/show_bug.cgi?id=712676 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/67974
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:freedesktop:dbus:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.5.2:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:d-bus_project:d-bus:1.2.4.2:*:*:*:*:*:*:permissive
cpe:2.3:a:d-bus_project:d-bus:1.2.4.4:*:*:*:*:*:*:permissive
cpe:2.3:a:d-bus_project:d-bus:1.2.4.6:*:*:*:*:*:*:permissive
cpe:2.3:a:freedesktop:dbus:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.12:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.14:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.16:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.18:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.20:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.22:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.24:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.26:*:*:*:*:*:*:*

History

21 Nov 2024, 01:27

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629938 - () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629938 -
References () http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.2&id=6519a1f77c61d753d4c97efd6e15630eb275336e - Patch () http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.2&id=6519a1f77c61d753d4c97efd6e15630eb275336e - Patch
References () http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 - Patch () http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 - Patch
References () http://cgit.freedesktop.org/dbus/dbus/tree/NEWS?h=dbus-1.2 - Patch () http://cgit.freedesktop.org/dbus/dbus/tree/NEWS?h=dbus-1.2 - Patch
References () http://cgit.freedesktop.org/dbus/dbus/tree/NEWS?h=dbus-1.4 - () http://cgit.freedesktop.org/dbus/dbus/tree/NEWS?h=dbus-1.4 -
References () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 - () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 -
References () http://lists.freedesktop.org/archives/dbus/2007-March/007357.html - () http://lists.freedesktop.org/archives/dbus/2007-March/007357.html -
References () http://lists.freedesktop.org/archives/dbus/2011-May/014408.html - () http://lists.freedesktop.org/archives/dbus/2011-May/014408.html -
References () http://openwall.com/lists/oss-security/2011/06/12/1 - Patch () http://openwall.com/lists/oss-security/2011/06/12/1 - Patch
References () http://openwall.com/lists/oss-security/2011/06/12/2 - () http://openwall.com/lists/oss-security/2011/06/12/2 -
References () http://openwall.com/lists/oss-security/2011/06/13/12 - Patch () http://openwall.com/lists/oss-security/2011/06/13/12 - Patch
References () http://secunia.com/advisories/44896 - Vendor Advisory () http://secunia.com/advisories/44896 - Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2011-1132.html - () http://www.redhat.com/support/errata/RHSA-2011-1132.html -
References () https://bugs.freedesktop.org/show_bug.cgi?id=38120 - () https://bugs.freedesktop.org/show_bug.cgi?id=38120 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=712676 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=712676 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/67974 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/67974 -

27 Dec 2023, 16:36

Type Values Removed Values Added
CPE cpe:2.3:a:d-bus_project:d-bus:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.2.18:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.2.26:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.2.12:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.4.8:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.2.20:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.2.24:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.2.22:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.2.14:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.2.16:*:*:*:*:*:*:*
cpe:2.3:a:d-bus_project:d-bus:1.4.10:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.22:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.14:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.12:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.20:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.24:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.18:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.16:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.26:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.2.1:*:*:*:*:*:*:*

Information

Published : 2011-06-22 22:55

Updated : 2024-11-21 01:27


NVD link : CVE-2011-2200

Mitre link : CVE-2011-2200

CVE.ORG link : CVE-2011-2200


JSON object : View

Products Affected

freedesktop

  • dbus

d-bus_project

  • d-bus
CWE
CWE-20

Improper Input Validation