CVE-2019-12749

7.1 HIGH
Published: June 11, 2019 Modified: February 13, 2026
View on NVD

Description

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/06/11/2
Source: cve@mitre.org
Mailing List Mitigation Third Party Advisory
https://usn.ubuntu.com/4015-1/
Source: cve@mitre.org
Third Party Advisory
https://usn.ubuntu.com/4015-2/
Source: cve@mitre.org
https://www.openwall.com/lists/oss-security/2019/06/11/2
Source: cve@mitre.org
Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/06/11/2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Mitigation Third Party Advisory
http://www.securityfocus.com/bid/108751
Source: af854a3a-2127-422b-91ae-364da2661108
https://access.redhat.com/errata/RHSA-2019:1726
Source: af854a3a-2127-422b-91ae-364da2661108
https://access.redhat.com/errata/RHSA-2019:2868
Source: af854a3a-2127-422b-91ae-364da2661108
https://access.redhat.com/errata/RHSA-2019:2870
Source: af854a3a-2127-422b-91ae-364da2661108
https://access.redhat.com/errata/RHSA-2019:3707
Source: af854a3a-2127-422b-91ae-364da2661108
https://seclists.org/bugtraq/2019/Jun/16
Source: af854a3a-2127-422b-91ae-364da2661108
https://security.gentoo.org/glsa/201909-08
Source: af854a3a-2127-422b-91ae-364da2661108
https://security.netapp.com/advisory/ntap-20241206-0010/
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/4015-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/4015-2/
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.debian.org/security/2019/dsa-4462
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.openwall.com/lists/oss-security/2019/06/11/2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory

35 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.1 / 10.0
EPSS (Exploit Probability)
0.0%
7th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

freedesktop canonical