Sploit.io - Search

Product: D-Bus Development branch, version: <= 1.13.16 (Fixed: >= 1.13.18)

CVE-2020-35512

Severity: Unknown

Description: A use-after-free flaw was found in D-Bus Development branch <= 1.13.16, dbus-1.12.x stable branch <= 1.12.18, and dbus-1.10.x and older branches <= 1.10.30 when a system has multiple usernames sharing the same UID. When a set of policy rules references these usernames, D-Bus may free some memory in the heap, which is still used by data structures necessary for the other usernames sharing the UID, possibly leading to a crash or other undefined behaviors

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.000340000
  • Percentile: 0.094370000
  • Date: 2025-12-30

ExploitDB

No data available.

HackerOne Data

  • Rank: 8510
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • n/a D-Bus Development branch - Versions: <= 1.13.16 (Fixed: >= 1.13.18)
    • n/a dbus-1.12.x stable branch - Versions: <= 1.12.18 (Fixed: >= 1.12.20)
    • n/a dbus-1.10.x and older branches (EOL) - Versions: <= 1.10.30 (Fixed: 1.10.32)

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability, CVE-2020-35512, is a use-after-free flaw in D-Bus, a crucial inter-process communication system commonly used in Linux systems. The flaw occurs when multiple usernames share the same User ID (UID) and D-Bus policy rules reference these usernames. This can lead to memory being freed while still in use, potentially causing a crash or other undefined behavior. While the EPSS score is relatively low at 0.00034, the impact can be significant depending on the affected system's reliance on D-Bus. The business impact could range from service disruptions due to crashes to potentially more severe consequences if the use-after-free can be leveraged for code execution. The likelihood of exploitation is moderate, as it requires a specific configuration – multiple usernames with the same UID – but is not uncommon in larger environments. Ease of exploitation is also moderate, requiring a crafted set of policy rules. The vulnerability impacts availability primarily, but integrity and confidentiality could be impacted if the use-after-free can be chained with other vulnerabilities to achieve code execution.

    2. Potential Attack Scenarios
    A potential attack scenario involves a system administrator configuring multiple users with the same UID for simplified permission management. These users are then referenced in D-Bus policy rules. An attacker, with the ability to influence the D-Bus policy rules (perhaps through a configuration file or service), can craft rules that trigger the use-after- free condition. This could be accomplished by having the policy rules reference these usernames in a way that causes D-Bus to free memory while it's still being used by another user sharing the same UID. The outcome could be a D-Bus crash, disrupting services relying on D-Bus for communication. More severe outcomes are possible if the use-after-free can be leveraged to achieve arbitrary code execution, potentially allowing the attacker to gain control of the system.

    3. Mitigation Recommendations
    The primary mitigation is to upgrade D-Bus to a patched version. For the Development branch, upgrade to version 1.13.18 or later. For the 1.12.x stable branch, upgrade to version 1.12.20 or later. For the 1.10.x and older branches, upgrade to version 1.10.32 or later. The specific upgrade process will vary depending on the Linux distribution in use. Patching should be prioritized, especially on systems heavily reliant on D-Bus. Consider reviewing D-Bus policy rules to identify any potential vulnerabilities and ensure they are correctly configured. Further information and updates can be found at the following resources: https://bugs.gentoo.org/755392, https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128, https://bugzilla.redhat.com/show_bug.cgi?id=1909101, and https://security-tracker.debian.org/tracker/CVE-2020-35512.

    4. Executive Summary
    CVE-2020-35512 is a use-after-free vulnerability in D-Bus, a core component of many Linux systems. This vulnerability can cause service disruptions due to crashes, and potentially, more severe impacts if the use-after-free can be leveraged for code execution. The vulnerability occurs when multiple users share the same User ID and D-Bus policy rules reference these users. While the probability of exploitation is moderate, the impact can be significant for systems heavily reliant on D-Bus. We recommend upgrading D-Bus to the latest patched version (1.13.18 or later for the Development branch, 1.12.20 or later for the 1.12.x stable branch, and 1.10.32 or later for the 1.10.x branch) to mitigate the risk. Prompt patching is crucial to maintain system stability and availability, minimizing potential business disruptions.