Multiple vulnerabilities in Linux D-Bus Message Broker



Published: 2022-09-21
Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2022-31213
CVE-2022-31212
CWE-ID CWE-476
CWE-125
Exploitation vector Local
Public exploit Public exploit code for vulnerability #1 is available.
Public exploit code for vulnerability #2 is available.
Vulnerable software
Subscribe
Linux D-Bus Message Broker
Universal components / Libraries / Libraries used by multiple products

Vendor bus1

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) NULL pointer dereference

EUVDB-ID: #VU67528

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-31213

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: Yes

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error when handling a malformed XML config file. A local user can supply a specially crafted XML file to the service and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux D-Bus Message Broker: 1 - 30


CPE2.3 External links

http://sec-consult.com/vulnerability-lab/advisory/memory-corruption-vulnerabilities-dbus-broker/
http://github.com/bus1/dbus-broker/compare/v30...v31

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) Out-of-bounds read

EUVDB-ID: #VU67527

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-31212

CWE-ID: CWE-125 - Out-of-bounds Read

Exploit availability: Yes

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition when parsing DBus service Exec line in c-uitl/c-shquote. A local user can pass specially crafted input to the service, trigger an out-of-bounds read error and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Linux D-Bus Message Broker: 1 - 30


CPE2.3 External links

http://sec-consult.com/vulnerability-lab/advisory/memory-corruption-vulnerabilities-dbus-broker/
http://github.com/bus1/dbus-broker/compare/v30...v31

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###