D-Bus up to 1.8.6 missing release of file descriptor or handle after effective lifetime
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.0 | $0-$5k | 0.00 |
Summary
A vulnerability marked as problematic has been reported in D-Bus. Impacted is an unknown function. Performing a manipulation results in missing release of file descriptor or handle after effective lifetime. This vulnerability is cataloged as CVE-2014-3637. There is no exploit available.
Details
A vulnerability was found in D-Bus. It has been classified as problematic. This affects an unknown code. The manipulation with an unknown input leads to a missing release of file descriptor or handle after effective lifetime vulnerability. CWE is classifying the issue as CWE-775. The product does not release a file descriptor or handle after its effective lifetime has ended, i.e., after the file descriptor/handle is no longer needed. This is going to have an impact on availability. The summary by CVE is:
D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 does not properly close connections for processes that have terminated, which allows local users to cause a denial of service via a D-bus message containing a D-Bus connection file descriptor.
The weakness was shared 09/22/2014 (Website). It is possible to read the advisory at bugs.freedesktop.org. This vulnerability is uniquely identified as CVE-2014-3637 since 05/14/2014. The exploitability is told to be easy. Attacking locally is a requirement. No form of authentication is needed for exploitation. The technical details are unknown and an exploit is not publicly available.
The vulnerability scanner Nessus provides a plugin with the ID 77716 (Debian DSA-3026-1 : dbus - security update), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Debian Local Security Checks. The commercial vulnerability scanner Qualys is able to test this issue with plugin 124841 (Solaris 11.3 Support Repository Update (SRU) 6.5.0 Missing).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the databases at X-Force (96008), Tenable (77716), SecurityFocus (BID 69829†), Secunia (SA61378†) and Vulnerability Center (SBV-46276†). The entries VDB-70401, VDB-70400, VDB-71440 and VDB-71438 are related to this item. Be aware that VulDB is the high quality source for vulnerability data.
Product
Name
Version
- 1.3.0
- 1.3.1
- 1.4.0
- 1.4.1
- 1.4.4
- 1.4.6
- 1.4.8
- 1.4.10
- 1.4.12
- 1.4.14
- 1.4.16
- 1.4.18
- 1.4.20
- 1.4.22
- 1.4.24
- 1.4.26
- 1.5.0
- 1.5.2
- 1.5.4
- 1.5.6
- 1.5.8
- 1.5.10
- 1.5.12
- 1.6.0
- 1.6.2
- 1.6.4
- 1.6.6
- 1.6.8
- 1.6.10
- 1.6.12
- 1.6.14
- 1.6.16
- 1.6.18
- 1.6.20
- 1.6.22
- 1.8.0
- 1.8.2
- 1.8.4
- 1.8.6
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.0VulDB Meta Temp Score: 4.0
VulDB Base Score: 4.0
VulDB Temp Score: 4.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Missing release of file descriptor or handle after effective lifetimeCWE: CWE-775 / CWE-400 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 77716
Nessus Name: Debian DSA-3026-1 : dbus - security update
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
OpenVAS ID: 703026
OpenVAS Name: Debian Security Advisory DSA 3026-1 (dbus - security update)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
05/14/2014 🔍09/16/2014 🔍
09/16/2014 🔍
09/22/2014 🔍
09/22/2014 🔍
09/28/2014 🔍
03/26/2015 🔍
03/29/2022 🔍
Sources
Advisory: USN-2352-1Status: Not defined
Confirmation: 🔍
CVE: CVE-2014-3637 (🔍)
GCVE (CVE): GCVE-0-2014-3637
GCVE (VulDB): GCVE-100-71439
OVAL: 🔍
X-Force: 96008
SecurityFocus: 69829 - D-Bus CVE-2014-3637 Denial of Service Vulnerability
Secunia: 61378
SecurityTracker: 1030864
Vulnerability Center: 46276 - D-Bus before 1.6.24 and 1.8 before 1.8.8 Local DoS Vulnerability - CVE-2014-3637, Low
See also: 🔍
Entry
Created: 03/26/2015 15:08Updated: 03/29/2022 10:01
Changes: 03/26/2015 15:08 (63), 06/07/2017 11:08 (6), 03/29/2022 09:57 (4), 03/29/2022 10:01 (1)
Complete: 🔍
Cache ID: 216:DA2:103
Be aware that VulDB is the high quality source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.