CVE-2012-3524

libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X.org and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable.  NOTE: libdbus maintainers state that this is a vulnerability in the applications that do not cleanse environment variables, not in libdbus itself: "we do not support use of libdbus in setuid binaries that do not sanitize their environment before their first call into libdbus."
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.9 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 97%
VendorProductVersion
freedesktoplibdbus
𝑥
≤ 1.5.12
freedesktoplibdbus
1.5.0
freedesktoplibdbus
1.5.2
freedesktoplibdbus
1.5.4
freedesktoplibdbus
1.5.6
freedesktoplibdbus
1.5.8
freedesktoplibdbus
1.5.10
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
dbus
bullseye
1.12.28-0+deb11u1
fixed
squeeze
not-affected
bullseye (security)
1.12.24-0+deb11u1
fixed
bookworm
1.14.10-1~deb12u1
fixed
sid
1.14.10-6
fixed
trixie
1.14.10-6
fixed
glib2.0
bullseye
2.66.8-1+deb11u4
fixed
squeeze
not-affected
bullseye (security)
2.66.8-1+deb11u3
fixed
bookworm
2.74.6-2+deb12u3
fixed
bookworm (security)
2.74.6-2+deb12u2
fixed
sid
2.82.2-2
fixed
trixie
2.82.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dbus
precise
Fixed 1.4.18-1ubuntu1.1
released
oneiric
Fixed 1.4.14-1ubuntu1.1
released
natty
Fixed 1.4.6-1ubuntu6.2
released
lucid
Fixed 1.2.16-2ubuntu4.5
released
hardy
Fixed 1.1.20-1ubuntu3.7
released
Common Weakness Enumeration
References