Description
The dbus_signature_validate function in the D-bus library (libdbus) before 1.2.4 allows remote attackers to cause a denial of service (application abort) via a message containing a malformed signature, which triggers a failed assertion error.
Exploits
78222009-01-19dosMultiple
D-Bus Daemon < 1.2.4 - 'libdbus' Denial of Service
By Jon Oberheide
References
secalert@redhat.com
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705secalert@redhat.com
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.htmlsecalert@redhat.com
http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.htmlsecalert@redhat.com
http://secunia.com/advisories/32127secalert@redhat.com
http://secunia.com/advisories/32230secalert@redhat.com
http://secunia.com/advisories/32281secalert@redhat.com
http://secunia.com/advisories/32385secalert@redhat.com
http://secunia.com/advisories/33396secalert@redhat.com
http://www.debian.org/security/2008/dsa-1658secalert@redhat.com
http://www.freedesktop.org/wiki/Software/dbus#head-dad0dab297a44f1d7a3b1259cfc06b583fd6a88asecalert@redhat.com
http://www.mandriva.com/security/advisories?name=MDVSA-2008:213secalert@redhat.com
http://www.redhat.com/support/errata/RHSA-2009-0008.htmlsecalert@redhat.com
http://www.securityfocus.com/bid/31602secalert@redhat.com
http://www.securitytracker.com/id?1021063secalert@redhat.com
http://www.ubuntu.com/usn/usn-653-1secalert@redhat.com
http://www.vupen.com/english/advisories/2008/2762secalert@redhat.com
https://bugs.freedesktop.org/show_bug.cgi?id=17803secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-3834secalert@redhat.com
https://exchange.xforce.ibmcloud.com/vulnerabilities/45701secalert@redhat.com
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10253secalert@redhat.com
https://www.exploit-db.com/exploits/7822secalert@redhat.com
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00298.htmlaf854a3a-2127-422b-91ae-364da2661108
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705af854a3a-2127-422b-91ae-364da2661108
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.htmlaf854a3a-2127-422b-91ae-364da2661108
http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.htmlaf854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32127af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32230af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32281af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32385af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33396af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2008/dsa-1658af854a3a-2127-422b-91ae-364da2661108
http://www.freedesktop.org/wiki/Software/dbus#head-dad0dab297a44f1d7a3b1259cfc06b583fd6a88aaf854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2008:213af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2009-0008.htmlaf854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/31602af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1021063af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-653-1af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/2762af854a3a-2127-422b-91ae-364da2661108
https://bugs.freedesktop.org/show_bug.cgi?id=17803af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-3834af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/45701af854a3a-2127-422b-91ae-364da2661108
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10253af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/7822af854a3a-2127-422b-91ae-364da2661108
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00298.html