Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1818-1 | dbus security update |
Debian DSA |
DSA-4462-1 | dbus security update |
EUVD |
EUVD-2019-4335 | dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass. |
Ubuntu USN |
USN-4015-1 | DBus vulnerability |
Ubuntu USN |
USN-4015-2 | DBus vulnerability |
Fri, 13 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 06 Dec 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-13T19:57:55.649Z
Reserved: 2019-06-06T00:00:00.000Z
Link: CVE-2019-12749
Updated: 2024-12-06T13:09:22.768Z
Status : Modified
Published: 2019-06-11T17:29:00.517
Modified: 2026-02-13T20:16:12.897
Link: CVE-2019-12749
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN