CVE-2014-3639
Summary
| CVE | CVE-2014-3639 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2014-09-22 15:55:00 UTC |
| Updated | 2023-12-27 16:36:00 UTC |
| Description | The dbus-daemon in D-Bus before 1.6.24 and 1.8.x before 1.8.8 does not properly close old connections, which allows local users to cause a denial of service (incomplete connection consumption and prevention of new connections) via a large number of incomplete connections. |
Risk And Classification
Problem Types: CWE-399
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | D-bus Project | D-bus | 1.6.0 | All | All | All |
| Application | D-bus Project | D-bus | 1.6.10 | All | All | All |
| Application | D-bus Project | D-bus | 1.6.12 | All | All | All |
| Application | D-bus Project | D-bus | 1.6.14 | All | All | All |
| Application | D-bus Project | D-bus | 1.6.16 | All | All | All |
| Application | D-bus Project | D-bus | 1.6.18 | All | All | All |
| Application | D-bus Project | D-bus | 1.6.2 | All | All | All |
| Application | D-bus Project | D-bus | 1.6.20 | All | All | All |
| Application | D-bus Project | D-bus | 1.6.4 | All | All | All |
| Application | D-bus Project | D-bus | 1.6.6 | All | All | All |
| Application | D-bus Project | D-bus | 1.6.8 | All | All | All |
| Application | D-bus Project | D-bus | 1.8.0 | All | All | All |
| Application | D-bus Project | D-bus | 1.8.2 | All | All | All |
| Application | D-bus Project | D-bus | 1.8.4 | All | All | All |
| Application | D-bus Project | D-bus | 1.8.6 | All | All | All |
| Application | D-bus Project | D-bus | 1.6.0 | All | All | All |
| Application | D-bus Project | D-bus | 1.6.10 | All | All | All |
| Application | D-bus Project | D-bus | 1.6.12 | All | All | All |
| Application | D-bus Project | D-bus | 1.6.14 | All | All | All |
| Application | D-bus Project | D-bus | 1.6.16 | All | All | All |
| Application | D-bus Project | D-bus | 1.6.18 | All | All | All |
| Application | D-bus Project | D-bus | 1.6.2 | All | All | All |
| Application | D-bus Project | D-bus | 1.6.20 | All | All | All |
| Application | D-bus Project | D-bus | 1.6.4 | All | All | All |
| Application | D-bus Project | D-bus | 1.6.6 | All | All | All |
| Application | D-bus Project | D-bus | 1.6.8 | All | All | All |
| Application | D-bus Project | D-bus | 1.8.0 | All | All | All |
| Application | D-bus Project | D-bus | 1.8.2 | All | All | All |
| Application | D-bus Project | D-bus | 1.8.4 | All | All | All |
| Application | D-bus Project | D-bus | 1.8.6 | All | All | All |
| Application | D-bus Project | D-bus | All | All | All | All |
| Application | Freedesktop | Dbus | 1.6.0 | All | All | All |
| Application | Freedesktop | Dbus | 1.6.10 | All | All | All |
| Application | Freedesktop | Dbus | 1.6.12 | All | All | All |
| Application | Freedesktop | Dbus | 1.6.14 | All | All | All |
| Application | Freedesktop | Dbus | 1.6.16 | All | All | All |
| Application | Freedesktop | Dbus | 1.6.18 | All | All | All |
| Application | Freedesktop | Dbus | 1.6.2 | All | All | All |
| Application | Freedesktop | Dbus | 1.6.20 | All | All | All |
| Application | Freedesktop | Dbus | 1.6.4 | All | All | All |
| Application | Freedesktop | Dbus | 1.6.6 | All | All | All |
| Application | Freedesktop | Dbus | 1.6.8 | All | All | All |
| Application | Freedesktop | Dbus | 1.8.0 | All | All | All |
| Application | Freedesktop | Dbus | 1.8.2 | All | All | All |
| Application | Freedesktop | Dbus | 1.8.4 | All | All | All |
| Application | Freedesktop | Dbus | 1.8.6 | All | All | All |
| Operating System | Opensuse | Opensuse | 12.3 | All | All | All |
| Operating System | Opensuse | Opensuse | 12.3 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| D-BUS Buffer Overflow and Multiple Processing Flaws Let Local Users Obtain Elevated Privileges and Deny Service - SecurityTracker | SECTRACK | www.securitytracker.com | |
| USN-2352-1: DBus vulnerabilities | Ubuntu | UBUNTU | www.ubuntu.com | |
| Bug 80919 – CVE-2014-3639: Security implications of Bug #80851 - max_incomplete_connections | CONFIRM | bugs.freedesktop.org | Patch |
| oss-security - CVE-2014-3635 to 3639: security issues in D-Bus < 1.8.8 | MLIST | www.openwall.com | |
| Support / Security / Advisories / / MDVSA-2015:176 | Mandriva | MANDRIVA | www.mandriva.com | |
| Security Advisory SA61431 - SUSE update for dbus-1 - Secunia | SECUNIA | secunia.com | |
| Debian -- Security Information -- DSA-3026-1 dbus | DEBIAN | www.debian.org | |
| Mageia Advisory: MGASA-2014-0395 - Updated dbus packages fix multiple security vulnerabilities | CONFIRM | advisories.mageia.org | |
| Security Advisory SA61378 - Debian update for dbus - Secunia | SECUNIA | secunia.com | |
| [security-announce] SUSE-SU-2014:1146-1: important: Security update for | SUSE | lists.opensuse.org | |
| openSUSE-SU-2014:1239-1: moderate: dbus-1: update to 1.6.24 | SUSE | lists.opensuse.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.