CVE-2008-4311 : Detail

CVE-2008-4311

A05-Security Misconfiguration
0.04%V3
Local
2008-12-09
23h00 +00:00
2017-08-07
10h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The default configuration of system.conf in D-Bus (aka DBus) before 1.2.6 omits the send_type attribute in certain rules, which allows local users to bypass intended access restrictions by (1) sending messages, related to send_requested_reply; and possibly (2) receiving messages, related to receive_requested_reply.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-16 Category : Configuration
Weaknesses in this category are typically introduced during the configuration of the software.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.6 AV:L/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Freedesktop>>Dbus >> Version To (including) 1.2.4

Freedesktop>>Dbus >> Version 0.1

Freedesktop>>Dbus >> Version 0.2

Freedesktop>>Dbus >> Version 0.3

Freedesktop>>Dbus >> Version 0.4

Freedesktop>>Dbus >> Version 0.5

Freedesktop>>Dbus >> Version 0.6

Freedesktop>>Dbus >> Version 0.7

Freedesktop>>Dbus >> Version 0.8

Freedesktop>>Dbus >> Version 0.9

Freedesktop>>Dbus >> Version 0.10

Freedesktop>>Dbus >> Version 0.11

Freedesktop>>Dbus >> Version 0.12

Freedesktop>>Dbus >> Version 0.13

Freedesktop>>Dbus >> Version 0.20

Freedesktop>>Dbus >> Version 0.21

Freedesktop>>Dbus >> Version 0.22

Freedesktop>>Dbus >> Version 0.23

Freedesktop>>Dbus >> Version 0.23.1

Freedesktop>>Dbus >> Version 0.23.2

Freedesktop>>Dbus >> Version 0.23.3

Freedesktop>>Dbus >> Version 0.31

Freedesktop>>Dbus >> Version 0.32

    Freedesktop>>Dbus >> Version 0.33

      Freedesktop>>Dbus >> Version 0.34

        Freedesktop>>Dbus >> Version 0.35

          Freedesktop>>Dbus >> Version 0.35.1

          Freedesktop>>Dbus >> Version 0.35.2

          Freedesktop>>Dbus >> Version 0.36

            Freedesktop>>Dbus >> Version 0.36.1

            Freedesktop>>Dbus >> Version 0.36.2

            Freedesktop>>Dbus >> Version 0.50

            Freedesktop>>Dbus >> Version 0.60

            Freedesktop>>Dbus >> Version 0.61

            Freedesktop>>Dbus >> Version 0.62

            Freedesktop>>Dbus >> Version 0.90

            Freedesktop>>Dbus >> Version 0.91

            Freedesktop>>Dbus >> Version 0.92

            Freedesktop>>Dbus >> Version 1.0

              Freedesktop>>Dbus >> Version 1.0

                Freedesktop>>Dbus >> Version 1.0

                  Freedesktop>>Dbus >> Version 1.0

                    Freedesktop>>Dbus >> Version 1.1.0

                    Freedesktop>>Dbus >> Version 1.1.1

                    Freedesktop>>Dbus >> Version 1.1.2

                    Freedesktop>>Dbus >> Version 1.1.4

                    References

                    http://secunia.com/advisories/33047
                    Tags : third-party-advisory, x_refsource_SECUNIA
                    http://secunia.com/advisories/34642
                    Tags : third-party-advisory, x_refsource_SECUNIA
                    http://www.vupen.com/english/advisories/2008/3355
                    Tags : vdb-entry, x_refsource_VUPEN
                    http://secunia.com/advisories/33055
                    Tags : third-party-advisory, x_refsource_SECUNIA
                    http://secunia.com/advisories/34360
                    Tags : third-party-advisory, x_refsource_SECUNIA
                    http://www.securityfocus.com/bid/32674
                    Tags : vdb-entry, x_refsource_BID