Scientific Linux Security Update : dbus on SL6.x i386/x86_64 (20120913)

medium Nessus Plugin ID 62106

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

It was discovered that the D-Bus library honored environment settings even when running with elevated privileges. A local attacker could possibly use this flaw to escalate their privileges, by setting specific environment variables before running a setuid or setgid application linked against the D-Bus library (libdbus).
(CVE-2012-3524)

Note: With this update, libdbus ignores environment variables when used by setuid or setgid applications. The environment is not ignored when an application gains privileges via file system capabilities;
however, no application shipped in Red Hat Enterprise Linux 6 gains privileges via file system capabilities.

We would like to thank Sebastian Krahmer of the SUSE Security Team for reporting this issue.

For the update to take effect, all running instances of dbus-daemon and all running applications using the libdbus library must be restarted, or the system rebooted.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?11daf4fa

Plugin Details

Severity: Medium

ID: 62106

File Name: sl_20120913_dbus_on_SL6_x.nasl

Version: 1.8

Type: local

Agent: unix

Published: 9/15/2012

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.5

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:dbus, p-cpe:/a:fermilab:scientific_linux:dbus-devel, p-cpe:/a:fermilab:scientific_linux:dbus-doc, p-cpe:/a:fermilab:scientific_linux:dbus-libs, p-cpe:/a:fermilab:scientific_linux:dbus-x11, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/13/2012

Vulnerability Publication Date: 9/18/2012

Exploitable With

Core Impact

Reference Information

CVE: CVE-2012-3524