RHEL 6 : dbus (RHSA-2012:1261)

Medium Nessus Plugin ID 62087


The remote Red Hat host is missing one or more security updates.


Updated dbus packages that fix one security issue are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

D-Bus is a system for sending messages between applications. It is used for the system-wide message bus service and as a per-user-login-session messaging facility.

It was discovered that the D-Bus library honored environment settings even when running with elevated privileges. A local attacker could possibly use this flaw to escalate their privileges, by setting specific environment variables before running a setuid or setgid application linked against the D-Bus library (libdbus).

Note: With this update, libdbus ignores environment variables when used by setuid or setgid applications. The environment is not ignored when an application gains privileges via file system capabilities;
however, no application shipped in Red Hat Enterprise Linux 6 gains privileges via file system capabilities.

Red Hat would like to thank Sebastian Krahmer of the SUSE Security Team for reporting this issue.

All users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all running instances of dbus-daemon and all running applications using the libdbus library must be restarted, or the system rebooted.


Update the affected packages.

See Also



Plugin Details

Severity: Medium

ID: 62087

File Name: redhat-RHSA-2012-1261.nasl

Version: $Revision: 1.13 $

Type: local

Agent: unix

Published: 2012/09/14

Modified: 2017/01/05

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.9

Temporal Score: 5.4

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:dbus, p-cpe:/a:redhat:enterprise_linux:dbus-debuginfo, p-cpe:/a:redhat:enterprise_linux:dbus-devel, p-cpe:/a:redhat:enterprise_linux:dbus-doc, p-cpe:/a:redhat:enterprise_linux:dbus-libs, p-cpe:/a:redhat:enterprise_linux:dbus-x11, cpe:/o:redhat:enterprise_linux:6, cpe:/o:redhat:enterprise_linux:6.3

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/09/13

Exploitable With

Core Impact

Reference Information

CVE: CVE-2012-3524

BID: 55517

RHSA: 2012:1261