![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.881631 |
Categoría: | CentOS Local Security Checks |
Título: | CentOS Update for dbus-glib CESA-2013:0568 centos6 |
Resumen: | The remote host is missing an update for the 'dbus-glib'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'dbus-glib' package(s) announced via the referenced advisory. Vulnerability Insight: dbus-glib is an add-on library to integrate the standard D-Bus library with the GLib main loop and threading model. A flaw was found in the way dbus-glib filtered the message sender (message source subject) when the 'NameOwnerChanged' signal was received. This could trick a system service using dbus-glib (such as fprintd) into believing a signal was sent from a privileged process, when it was not. A local attacker could use this flaw to escalate their privileges. (CVE-2013-0292) All dbus-glib users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications linked against dbus-glib, such as fprintd and NetworkManager, must be restarted for this update to take effect. Affected Software/OS: dbus-glib on CentOS 6 Solution: Please install the updated packages. CVSS Score: 7.2 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-0292 33614 http://www.exploit-db.com/exploits/33614 52225 http://secunia.com/advisories/52225 52375 http://secunia.com/advisories/52375 52404 http://secunia.com/advisories/52404 57985 http://www.securityfocus.com/bid/57985 90302 http://osvdb.org/90302 MDVSA-2013:071 http://www.mandriva.com/security/advisories?name=MDVSA-2013:071 RHSA-2013:0568 http://rhn.redhat.com/errata/RHSA-2013-0568.html USN-1753-1 http://www.ubuntu.com/usn/USN-1753-1 [oss-security] 20130215 CVE-2013-0292: authentication bypass due to insufficient checks in dbus-glib < 0.100.1 http://www.openwall.com/lists/oss-security/2013/02/15/10 dbus-message-sender-priv-esc(82135) https://exchange.xforce.ibmcloud.com/vulnerabilities/82135 http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=911658 http://cgit.freedesktop.org/dbus/dbus-glib/commit/?id=166978a09cf5edff4028e670b6074215a4c75eca http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html https://bugs.freedesktop.org/show_bug.cgi?id=60916 |
Copyright | Copyright (C) 2013 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |