Scientific Linux Security Update : dbus on SL6.x i386/x86_64

Medium Nessus Plugin ID 62106


The remote Scientific Linux host is missing one or more security updates.


It was discovered that the D-Bus library honored environment settings even when running with elevated privileges. A local attacker could possibly use this flaw to escalate their privileges, by setting specific environment variables before running a setuid or setgid application linked against the D-Bus library (libdbus).

Note: With this update, libdbus ignores environment variables when used by setuid or setgid applications. The environment is not ignored when an application gains privileges via file system capabilities;
however, no application shipped in Red Hat Enterprise Linux 6 gains privileges via file system capabilities.

We would like to thank Sebastian Krahmer of the SUSE Security Team for reporting this issue.

For the update to take effect, all running instances of dbus-daemon and all running applications using the libdbus library must be restarted, or the system rebooted.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 62106

File Name: sl_20120913_dbus_on_SL6_x.nasl

Version: $Revision: 1.4 $

Type: local

Agent: unix

Published: 2012/09/15

Modified: 2015/01/26

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/09/13

Exploitable With

Core Impact

Reference Information

CVE: CVE-2012-3524