SB2014102209 - Buffer overflow in dbus (Alpine package)
Published: October 22, 2014
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2014-3635)
The vulnerability allows a local non-authenticated attacker to read and manipulate data.
Off-by-one error in D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8, when running on a 64-bit system and the max_message_unix_fds limit is set to an odd number, allows local users to cause a denial of service (dbus-daemon crash) or possibly execute arbitrary code by sending one more file descriptor than the limit, which triggers a heap-based buffer overflow or an assertion failure.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=256f4e7e9f920e61c9a0f213d108851dd6eee97c
- https://git.alpinelinux.org/aports/commit/?id=d02e78275a3bb690d9d8099bf31ff92e3a9e68fe
- https://git.alpinelinux.org/aports/commit/?id=805a5164875cd3f789db8929be1b6c9380f98d98
- https://git.alpinelinux.org/aports/commit/?id=c3b756f3144debef12e39f410d862ad4a3a4f3d1