CVE-2011-2200
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
22/06/2011
Last modified:
11/04/2025
Description
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct unspecified state-modification attacks via crafted messages.
Impact
Base Score 2.0
4.60
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:freedesktop:dbus:1.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:d-bus_project:d-bus:1.2.4.2:*:*:*:*:*:*:permissive | ||
| cpe:2.3:a:d-bus_project:d-bus:1.2.4.4:*:*:*:*:*:*:permissive | ||
| cpe:2.3:a:d-bus_project:d-bus:1.2.4.6:*:*:*:*:*:*:permissive | ||
| cpe:2.3:a:freedesktop:dbus:1.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freedesktop:dbus:1.2.4:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629938
- http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.2&id=6519a1f77c61d753d4c97efd6e15630eb275336e
- http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
- http://cgit.freedesktop.org/dbus/dbus/tree/NEWS?h=dbus-1.2
- http://cgit.freedesktop.org/dbus/dbus/tree/NEWS?h=dbus-1.4
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
- http://lists.freedesktop.org/archives/dbus/2011-May/014408.html
- http://openwall.com/lists/oss-security/2011/06/12/1
- http://openwall.com/lists/oss-security/2011/06/12/2
- http://openwall.com/lists/oss-security/2011/06/13/12
- http://secunia.com/advisories/44896
- http://www.redhat.com/support/errata/RHSA-2011-1132.html
- https://bugs.freedesktop.org/show_bug.cgi?id=38120
- https://bugzilla.redhat.com/show_bug.cgi?id=712676
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67974
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629938
- http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.2&id=6519a1f77c61d753d4c97efd6e15630eb275336e
- http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
- http://cgit.freedesktop.org/dbus/dbus/tree/NEWS?h=dbus-1.2
- http://cgit.freedesktop.org/dbus/dbus/tree/NEWS?h=dbus-1.4
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
- http://lists.freedesktop.org/archives/dbus/2011-May/014408.html
- http://openwall.com/lists/oss-security/2011/06/12/1
- http://openwall.com/lists/oss-security/2011/06/12/2
- http://openwall.com/lists/oss-security/2011/06/13/12
- http://secunia.com/advisories/44896
- http://www.redhat.com/support/errata/RHSA-2011-1132.html
- https://bugs.freedesktop.org/show_bug.cgi?id=38120
- https://bugzilla.redhat.com/show_bug.cgi?id=712676
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67974



