FreeBSD : dbus -- multiple vulnerabilities (e6a7636a-02d0-11e4-88b6-080027671656)

Low Nessus Plugin ID 76364


The remote FreeBSD host is missing a security-related update.


Simon McVittie reports :

Alban Crequy at Collabora Ltd. discovered a bug in dbus-daemon's support for file descriptor passing. A malicious process could force system services or user applications to be disconnected from the D-Bus system bus by sending them a message containing a file descriptor, then causing that file descriptor to exceed the kernel's maximum recursion depth (itself introduced to fix a DoS) before dbus-daemon forwards the message to the victim process. Most services and applications exit when disconnected from the system bus, leading to a denial of service.

Additionally, Alban discovered that bug fd.o#79694, a bug previously reported by Alejandro Martinez Suarez which was n believed to be security flaw, could be used for a similar denial of service, by causing dbus-daemon to attempt to forward invalid file descriptors to a victim process when file descriptors become associated with the wrong message.


Update the affected package.

See Also

Plugin Details

Severity: Low

ID: 76364

File Name: freebsd_pkg_e6a7636a02d011e488b6080027671656.nasl

Version: $Revision: 1.4 $

Type: local

Published: 2014/07/04

Modified: 2016/05/26

Dependencies: 12634

Risk Information

Risk Factor: Low


Base Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:dbus, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2014/07/03

Vulnerability Publication Date: 2014/07/02

Reference Information

CVE: CVE-2014-3532, CVE-2014-3533