Vulnerability Details : CVE-2020-35512
A use-after-free flaw was found in D-Bus Development branch <= 1.13.16, dbus-1.12.x stable branch <= 1.12.18, and dbus-1.10.x and older branches <= 1.10.30 when a system has multiple usernames sharing the same UID. When a set of policy rules references these usernames, D-Bus may free some memory in the heap, which is still used by data structures necessary for the other usernames sharing the UID, possibly leading to a crash or other undefined behaviors
Vulnerability category: Memory Corruption
Products affected by CVE-2020-35512
- cpe:2.3:a:freedesktop:dbus:1.12.20:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-35512
0.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 2 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-35512
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2020-35512
-
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-35512
-
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128
Dangling pointer access in dbus-userdb.c (#305) · Issues · dbus / dbus · GitLab
-
https://bugs.gentoo.org/755392
755392 – <sys-apps/dbus-1.12.20: use after free if duplicate UIDsIssue Tracking;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1909101
1909101 – (CVE-2020-35512) CVE-2020-35512 dbus: users with the same numeric UID could lead to use-after-free and undefined behaviour
-
https://security-tracker.debian.org/tracker/CVE-2020-35512
CVE-2020-35512
Jump to