{"api_version":"1","generated_at":"2026-05-13T01:06:54+00:00","cve":"CVE-2014-3477","urls":{"html":"https://cve.report/CVE-2014-3477","api":"https://cve.report/api/cve/CVE-2014-3477.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2014-3477","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2014-3477"},"summary":{"title":"CVE-2014-3477","description":"The dbus-daemon in D-Bus 1.2.x through 1.4.x, 1.6.x before 1.6.20, and 1.8.x before 1.8.4, sends an AccessDenied error to the service instead of a client when the client is prohibited from accessing the service, which allows local users to cause a denial of service (initialization failure and exit) or possibly conduct a side-channel attack via a D-Bus message to an inactive service.","state":"PUBLISHED","assigner":"redhat","published_at":"2014-07-01 17:55:04","updated_at":"2026-05-06 22:30:45"},"problem_types":["NVD-CWE-noinfo","n/a","CWE-noinfo Not enough information"],"metrics":[{"version":"3.1","source":"ADP","type":"DECLARED","score":"4","severity":"MEDIUM","vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","data":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":4,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"4","severity":"MEDIUM","vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":4,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"}},{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"2.1","severity":"","vector":"AV:L/AC:L/Au:N/C:N/I:N/A:P","data":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html","name":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"openSUSE-SU-2014:1239-1: moderate: dbus-1: update to 1.6.24","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.debian.org/security/2014/dsa-2971","name":"http://www.debian.org/security/2014/dsa-2971","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Debian -- Security Information -- DSA-2971-1 dbus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/oss-sec/2014/q2/509","name":"http://seclists.org/oss-sec/2014/q2/509","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"oss-sec: CVE-2014-3477 (fd.o#78979): local DoS in dbus-daemon","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176","name":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Support / Security / Advisories /  / MDVSA-2015:176 | Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59428","name":"http://secunia.com/advisories/59428","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Security Advisory SA59428 - SUSE update for dbus-1 - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugs.freedesktop.org/show_bug.cgi?id=78979","name":"https://bugs.freedesktop.org/show_bug.cgi?id=78979","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Bug 78979 – [CVE-2014-3477] security and activation: error and denial of service","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html","name":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"openSUSE-SU-2014:0874-1: moderate: dbus-1: Fixed possible DoS","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html","name":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"openSUSE-SU-2014:0821-1: moderate: dbus-1: Fixed possible DoS","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59798","name":"http://secunia.com/advisories/59798","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Security Advisory SA59798 - Ubuntu update for dbus - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59611","name":"http://secunia.com/advisories/59611","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://advisories.mageia.org/MGASA-2014-0266.html","name":"http://advisories.mageia.org/MGASA-2014-0266.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Mageia Advisory: MGASA-2014-0266 - Updated dbus packages fix security vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/67986","name":"http://www.securityfocus.com/bid/67986","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"D-Bus 'activation.c' Denial of Service Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567","name":"http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"dbus/dbus - a lightweight ipc mechanism  (mirrored from https://gitlab.freedesktop.org/dbus/dbus)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2014-3477","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3477","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"d-bus_project","cpe5":"d-bus","cpe6":"1.2.4.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"d-bus_project","cpe5":"d-bus","cpe6":"1.2.4.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"d-bus_project","cpe5":"d-bus","cpe6":"1.2.4.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.2.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.2.12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.2.14","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.2.16","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.2.18","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.2.20","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.2.22","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.2.24","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.2.26","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.2.28","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.2.30","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.2.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.2.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.2.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.4.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.4.12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.4.14","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.4.16","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.4.18","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.4.20","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.4.22","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.4.24","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.4.26","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.4.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.4.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.4.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.6.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.6.12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.6.14","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.6.16","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.6.18","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.6.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.6.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.6.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.6.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3477","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freedesktop","cpe5":"dbus","cpe6":"1.8.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-06T10:43:06.078Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"59798","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/59798"},{"name":"59611","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/59611"},{"name":"openSUSE-SU-2014:1239","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html"},{"name":"67986","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/67986"},{"name":"openSUSE-SU-2014:0874","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html"},{"name":"[oss-security] 20140610 CVE-2014-3477 (fd.o#78979): local DoS in dbus-daemon","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://seclists.org/oss-sec/2014/q2/509"},{"name":"openSUSE-SU-2014:0821","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://advisories.mageia.org/MGASA-2014-0266.html"},{"name":"59428","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/59428"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=78979"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567"},{"name":"DSA-2971","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2014/dsa-2971"},{"name":"MDVSA-2015:176","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176"}],"title":"CVE Program Container"},{"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":4,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.1"}},{"other":{"content":{"id":"CVE-2014-3477","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2025-01-16T20:11:29.913416Z","version":"2.0.3"},"type":"ssvc"}}],"problemTypes":[{"descriptions":[{"description":"CWE-noinfo Not enough information","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2025-01-16T20:11:35.974Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2014-06-10T00:00:00.000Z","descriptions":[{"lang":"en","value":"The dbus-daemon in D-Bus 1.2.x through 1.4.x, 1.6.x before 1.6.20, and 1.8.x before 1.8.4, sends an AccessDenied error to the service instead of a client when the client is prohibited from accessing the service, which allows local users to cause a denial of service (initialization failure and exit) or possibly conduct a side-channel attack via a D-Bus message to an inactive service."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2015-04-13T14:57:00.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"59798","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/59798"},{"name":"59611","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/59611"},{"name":"openSUSE-SU-2014:1239","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html"},{"name":"67986","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/67986"},{"name":"openSUSE-SU-2014:0874","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html"},{"name":"[oss-security] 20140610 CVE-2014-3477 (fd.o#78979): local DoS in dbus-daemon","tags":["mailing-list","x_refsource_MLIST"],"url":"http://seclists.org/oss-sec/2014/q2/509"},{"name":"openSUSE-SU-2014:0821","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://advisories.mageia.org/MGASA-2014-0266.html"},{"name":"59428","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/59428"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=78979"},{"tags":["x_refsource_CONFIRM"],"url":"http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567"},{"name":"DSA-2971","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2014/dsa-2971"},{"name":"MDVSA-2015:176","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","ID":"CVE-2014-3477","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The dbus-daemon in D-Bus 1.2.x through 1.4.x, 1.6.x before 1.6.20, and 1.8.x before 1.8.4, sends an AccessDenied error to the service instead of a client when the client is prohibited from accessing the service, which allows local users to cause a denial of service (initialization failure and exit) or possibly conduct a side-channel attack via a D-Bus message to an inactive service."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"59798","refsource":"SECUNIA","url":"http://secunia.com/advisories/59798"},{"name":"59611","refsource":"SECUNIA","url":"http://secunia.com/advisories/59611"},{"name":"openSUSE-SU-2014:1239","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html"},{"name":"67986","refsource":"BID","url":"http://www.securityfocus.com/bid/67986"},{"name":"openSUSE-SU-2014:0874","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html"},{"name":"[oss-security] 20140610 CVE-2014-3477 (fd.o#78979): local DoS in dbus-daemon","refsource":"MLIST","url":"http://seclists.org/oss-sec/2014/q2/509"},{"name":"openSUSE-SU-2014:0821","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html"},{"name":"http://advisories.mageia.org/MGASA-2014-0266.html","refsource":"CONFIRM","url":"http://advisories.mageia.org/MGASA-2014-0266.html"},{"name":"59428","refsource":"SECUNIA","url":"http://secunia.com/advisories/59428"},{"name":"https://bugs.freedesktop.org/show_bug.cgi?id=78979","refsource":"CONFIRM","url":"https://bugs.freedesktop.org/show_bug.cgi?id=78979"},{"name":"http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567","refsource":"CONFIRM","url":"http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567"},{"name":"DSA-2971","refsource":"DEBIAN","url":"http://www.debian.org/security/2014/dsa-2971"},{"name":"MDVSA-2015:176","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:176"}]}}}},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2014-3477","datePublished":"2014-07-01T17:00:00.000Z","dateReserved":"2014-05-14T00:00:00.000Z","dateUpdated":"2025-01-16T20:11:35.974Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2014-07-01 17:55:04","lastModifiedDate":"2026-05-06 22:30:45","problem_types":["NVD-CWE-noinfo","n/a","CWE-noinfo Not enough information"],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":4,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.5,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:d-bus_project:d-bus:1.2.4.2:*:*:*:*:*:*:*","matchCriteriaId":"7A4C0086-D6E9-4CD1-9040-EB95758ED486"},{"vulnerable":true,"criteria":"cpe:2.3:a:d-bus_project:d-bus:1.2.4.4:*:*:*:*:*:*:*","matchCriteriaId":"2E7F6C16-1844-4F12-A3FC-C2AC10805334"},{"vulnerable":true,"criteria":"cpe:2.3:a:d-bus_project:d-bus:1.2.4.6:*:*:*:*:*:*:*","matchCriteriaId":"8AF98155-0783-4EF2-B9BB-618531386506"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"90BDF532-871B-4A0B-B536-038545C2339C"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.2.3:*:*:*:*:*:*:*","matchCriteriaId":"627AC7FF-614F-4143-B068-129D56F47A0F"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.2.4:*:*:*:*:*:*:*","matchCriteriaId":"CBC10415-F373-4C1B-ACD5-BC1D90D60EF7"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.2.6:*:*:*:*:*:*:*","matchCriteriaId":"0FCD6303-8FC9-4B1B-9072-769F37624A8D"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.2.8:*:*:*:*:*:*:*","matchCriteriaId":"75E0C99C-082B-4D68-97D2-0CC66FDF360E"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.2.10:*:*:*:*:*:*:*","matchCriteriaId":"7DA563AB-1D70-40E5-A758-232C4C9D5C73"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.2.12:*:*:*:*:*:*:*","matchCriteriaId":"84B75034-C869-4202-AEF1-8BA415D0584F"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.2.14:*:*:*:*:*:*:*","matchCriteriaId":"9E1C08CC-0038-40B0-8D8F-98B64ED6DCCC"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.2.16:*:*:*:*:*:*:*","matchCriteriaId":"DAF59F71-42DA-4E2F-AC3F-C497B74CE485"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.2.18:*:*:*:*:*:*:*","matchCriteriaId":"36489DA8-B79B-4073-9737-36A1D1BFD42E"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.2.20:*:*:*:*:*:*:*","matchCriteriaId":"20190232-8F31-4373-9609-BBF8A2534FC1"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.2.22:*:*:*:*:*:*:*","matchCriteriaId":"AEA457CD-A86F-4609-A41B-EC17C278AD39"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.2.24:*:*:*:*:*:*:*","matchCriteriaId":"9645C83A-B9AE-4199-8BF9-F859D06521CE"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.2.26:*:*:*:*:*:*:*","matchCriteriaId":"1700DA29-C87F-4F90-9C8B-62E228C89E22"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.2.28:*:*:*:*:*:*:*","matchCriteriaId":"440816BE-3817-48EC-8099-41DEC47ED8B9"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.2.30:*:*:*:*:*:*:*","matchCriteriaId":"1FDAE1F4-584F-4B70-9263-E6153A7F892C"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.3.0:*:*:*:*:*:*:*","matchCriteriaId":"96B154C1-28B1-4C8F-8D18-9A015CE81C25"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.3.1:*:*:*:*:*:*:*","matchCriteriaId":"357042A5-6CB3-44FD-AFAA-F626BBBA6747"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*","matchCriteriaId":"2D95FA2A-9CFB-4B02-A849-36431874AB7C"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*","matchCriteriaId":"EE4B9649-3F37-4700-A900-2D0EDFAB1FDB"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*","matchCriteriaId":"70C7FEDA-AE1E-4BD9-8998-9A6C01F80277"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*","matchCriteriaId":"71648B78-E1D4-4F74-B029-F6ECE65E84A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*","matchCriteriaId":"AD3C815C-E979-45DF-AA05-1A2CAF4DF910"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*","matchCriteriaId":"6E72AD88-640C-4B27-9A56-570151667FD5"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*","matchCriteriaId":"3D986A4B-827C-4064-9004-E4D6FA524FFC"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*","matchCriteriaId":"F7197910-4381-4D23-85A1-5348D20AAD63"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*","matchCriteriaId":"B1059BE8-1044-4DC7-9B41-E76A56225000"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*","matchCriteriaId":"2124D0C2-21A6-4C72-97B9-A53BCDA697DD"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*","matchCriteriaId":"1646C38B-596F-4614-93FC-0BFB88E9F034"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.4.22:*:*:*:*:*:*:*","matchCriteriaId":"0FB75B1D-CB6D-4152-B4F2-C24A6E6F830B"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*","matchCriteriaId":"9914C4DF-2B1B-416E-BE8A-274676F8CDA5"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:*","matchCriteriaId":"A2126812-E627-4514-8895-177F6A139B8C"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*","matchCriteriaId":"0A772FA8-668B-45AC-9813-0B5ADCE91DD6"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*","matchCriteriaId":"E155EB75-8D98-4469-98CB-81A40ABF0D9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*","matchCriteriaId":"4D6AF8D8-6A4E-4A42-A738-84690B6F9FDC"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*","matchCriteriaId":"E598FE36-ABEB-4682-950A-E462CC780F82"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*","matchCriteriaId":"EE224CED-410C-43D8-9220-0AEF5EB49C8D"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*","matchCriteriaId":"A24ED739-0B39-4A70-B7E0-8A859759233D"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*","matchCriteriaId":"F89DEA95-DFB8-4D75-BE65-A477972D143E"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*","matchCriteriaId":"76BCD0D9-4F06-46E7-8734-AAEE28DD1631"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*","matchCriteriaId":"C22CA4E4-458D-465A-8272-473055A608EB"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*","matchCriteriaId":"8133A184-FC2E-41AC-B2C2-EFD819B011FC"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*","matchCriteriaId":"9AB63C07-1022-4EEE-B419-4E0A80AE64A5"},{"vulnerable":true,"criteria":"cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*","matchCriteriaId":"68B161B9-7385-4C0B-AC4D-1145E1004B74"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2014","CveId":"3477","Ordinal":"1","Title":"CVE-2014-3477","CVE":"CVE-2014-3477","Year":"2014"},"notes":[{"CveYear":"2014","CveId":"3477","Ordinal":"1","NoteData":"The dbus-daemon in D-Bus 1.2.x through 1.4.x, 1.6.x before 1.6.20, and 1.8.x before 1.8.4, sends an AccessDenied error to the service instead of a client when the client is prohibited from accessing the service, which allows local users to cause a denial of service (initialization failure and exit) or possibly conduct a side-channel attack via a D-Bus message to an inactive service.","Type":"Description","Title":"CVE-2014-3477"},{"CveYear":"2014","CveId":"3477","Ordinal":"2","NoteData":"2014-07-01","Type":"Other","Title":"Published"},{"CveYear":"2014","CveId":"3477","Ordinal":"3","NoteData":"2015-04-13","Type":"Other","Title":"Modified"}]}}}