Vulnerability Details : CVE-2014-3639
The dbus-daemon in D-Bus before 1.6.24 and 1.8.x before 1.8.8 does not properly close old connections, which allows local users to cause a denial of service (incomplete connection consumption and prevention of new connections) via a large number of incomplete connections.
Vulnerability category: Denial of service
Products affected by CVE-2014-3639
- cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
- cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-3639
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-3639
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:N/I:N/A:P |
3.9
|
2.9
|
NIST |
CWE ids for CVE-2014-3639
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3639
-
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
[security-announce] SUSE-SU-2014:1146-1: important: Security update for
-
https://bugs.freedesktop.org/show_bug.cgi?id=80919
80919 – CVE-2014-3639: Security implications of Bug #80851 - max_incomplete_connectionsPatch
-
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
mandriva.com
-
http://www.openwall.com/lists/oss-security/2014/09/16/9
oss-security - CVE-2014-3635 to 3639: security issues in D-Bus < 1.8.8
-
http://secunia.com/advisories/61378
Sign in
-
http://www.ubuntu.com/usn/USN-2352-1
USN-2352-1: DBus vulnerabilities | Ubuntu security notices
-
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
openSUSE-SU-2014:1239-1: moderate: dbus-1: update to 1.6.24
-
http://www.debian.org/security/2014/dsa-3026
Debian -- Security Information -- DSA-3026-1 dbus
-
http://advisories.mageia.org/MGASA-2014-0395.html
Mageia Advisory: MGASA-2014-0395 - Updated dbus packages fix multiple security vulnerabilities
-
http://secunia.com/advisories/61431
Sign in
-
http://www.securitytracker.com/id/1030864
D-BUS Buffer Overflow and Multiple Processing Flaws Let Local Users Obtain Elevated Privileges and Deny Service - SecurityTracker
Jump to