The D-Bus security policy files in /etc/dbus-1/system.d/*.conf in fso-gsmd 0.12.0-3, fso-frameworkd 0.9.5.9+git20110512-4, and fso-usaged 0.12.0-2 as packaged in Debian, the upstream cornucopia.git (fsoaudiod, fsodatad, fsodeviced, fsogsmd, fsonetworkd, fsotdld, fsousaged) git master on 2015-01-19, the upstream framework.git 0.10.1 and git master on 2015-01-19, phonefsod 0.1+git20121018-1 as packaged in Debian, Ubuntu and potentially other packages, and potentially other fso modules do not properly filter D-Bus message paths, which might allow local users to cause a denial of service (dbus-daemon memory consumption), or execute arbitrary code as root by sending a crafted D-Bus message to any D-Bus system service.
References
Link Resource
http://www.openwall.com/lists/oss-security/2015/01/27/25 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/72363 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/100488 Third Party Advisory VDB Entry
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2017-09-25T19:00:00

Updated: 2017-09-28T12:57:01

Reserved: 2014-10-10T00:00:00


Link: CVE-2014-8156

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-09-26T01:29:00.273

Modified: 2017-10-11T19:23:59.350


Link: CVE-2014-8156

JSON object: View

cve-icon Redhat Information

No data.

CWE