Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34397: n/a

0
Medium
VulnerabilityCVE-2024-34397cvecve-2024-34397
Published: Tue May 07 2024 (05/07/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.

AI-Powered Analysis

AILast updated: 11/11/2025, 18:30:18 UTC

Technical Analysis

CVE-2024-34397 is a vulnerability in GNOME GLib's GDBus client implementation affecting versions before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. The issue arises when a GDBus-based client subscribes to signals from trusted system services like NetworkManager on a shared computer. Due to insufficient validation of the signal source, other local users on the same machine can send spoofed D-Bus signals that the client incorrectly interprets as originating from the trusted service. This flaw stems from a failure to properly authenticate the origin of D-Bus signals, classified under CWE-290 (Authentication Bypass). The impact is application-dependent but can include incorrect client behavior such as unauthorized configuration changes, privilege escalation within the application context, or denial of service. The vulnerability requires local access (attack vector: physical or remote local access), no privileges, and no user interaction, making it moderately easy to exploit in multi-user environments. The CVSS v3.1 score is 5.2 (medium), reflecting the limited attack scope but significant integrity impact. No public exploits have been reported yet, but the vulnerability poses a risk in shared Linux environments where GNOME GLib is used. The root cause is the lack of proper source validation on D-Bus signals, allowing signal spoofing by unprivileged users. Fixed versions have been released, and patching is the primary remediation.

Potential Impact

For European organizations, the vulnerability poses a risk primarily in multi-user Linux environments where GNOME GLib is deployed, such as shared workstations, development servers, or virtual desktop infrastructures. The ability for an unprivileged local user to spoof signals from trusted system services can lead to unauthorized changes in network configurations or other system settings managed via D-Bus, potentially disrupting operations or compromising system integrity. This can affect confidentiality indirectly if the altered behavior exposes sensitive data or enables further attacks. Availability may also be impacted if critical services are misconfigured or disabled. Organizations relying on GNOME-based desktops or applications that interact with NetworkManager or other system services via GDBus are particularly vulnerable. The threat is more pronounced in environments with multiple users sharing the same system, such as universities, research centers, or enterprises with shared Linux workstations. Although no exploits are known in the wild, the medium severity and ease of local exploitation warrant proactive mitigation to prevent potential misuse.

Mitigation Recommendations

1. Upgrade GNOME GLib to version 2.78.5 or later, or to fixed versions 2.79.x and 2.80.x at or above 2.80.1, as soon as possible to eliminate the vulnerability. 2. Restrict local user access on shared systems to trusted personnel only, minimizing the risk of malicious signal spoofing. 3. Implement strict user session isolation and consider using containerization or virtualization to separate user environments on shared machines. 4. Monitor D-Bus traffic and logs for unusual or unexpected signals that could indicate spoofing attempts. 5. Harden system services like NetworkManager by applying additional access controls or sandboxing where feasible. 6. Educate system administrators and users about the risks of shared environments and encourage the use of dedicated user accounts. 7. Regularly audit and update all GNOME-related components and dependencies to ensure timely application of security patches. 8. Consider disabling or limiting D-Bus signal subscriptions in applications where not strictly necessary to reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-05-02T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b4eff58c9332ff0738c

Added to database: 11/4/2025, 5:43:42 PM

Last enriched: 11/11/2025, 6:30:18 PM

Last updated: 12/15/2025, 9:16:07 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats