Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34397: n/a

0
Medium
VulnerabilityCVE-2024-34397cvecve-2024-34397
Published: Tue May 07 2024 (05/07/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.

AI-Powered Analysis

AILast updated: 11/04/2025, 17:54:13 UTC

Technical Analysis

CVE-2024-34397 is a vulnerability found in GNOME GLib, specifically affecting versions prior to 2.78.5, and 2.79.x and 2.80.x before 2.80.1. The issue arises when a GDBus-based client subscribes to signals from trusted system services like NetworkManager on a shared computer. Due to improper authentication of D-Bus signals, other unprivileged users on the same system can send spoofed signals that the client mistakenly accepts as originating from the trusted service. This flaw can cause the client application to behave incorrectly, with impacts varying depending on the application’s role and functionality. The vulnerability is categorized under CWE-290 (Authentication Bypass by Spoofing) and has a CVSS v3.1 base score of 5.2, indicating medium severity. The attack vector is local (AV:P), requires no privileges (PR:N), no user interaction (UI:N), and affects integrity and availability but not confidentiality. Although no exploits are currently known in the wild, the vulnerability poses a risk in multi-user environments where shared access to the system exists. The root cause is the lack of proper verification of the sender’s identity on the D-Bus IPC mechanism, which is critical for secure inter-process communication on Linux systems. This can lead to unauthorized command execution or state changes within applications relying on these signals.

Potential Impact

For European organizations, particularly those using Linux desktops or servers with GNOME environments, this vulnerability could allow malicious local users to interfere with system services by spoofing D-Bus signals. This can undermine system integrity, causing applications to perform unintended actions, potentially disrupting network configurations or other critical services managed via D-Bus. While confidentiality is not directly impacted, the integrity and availability of system services could be compromised, leading to operational disruptions. Organizations with shared computing environments, such as universities, research labs, or enterprises with multi-user Linux systems, are at higher risk. The medium CVSS score reflects moderate risk, but the ease of exploitation on shared systems without requiring authentication elevates the threat in such contexts. The absence of known exploits suggests limited current active threat but does not preclude future exploitation attempts.

Mitigation Recommendations

The primary mitigation is to upgrade GNOME GLib to versions 2.78.5 or later, or 2.80.1 and above for the affected branches, where the vulnerability is patched. Organizations should audit their systems to identify affected GLib versions and prioritize patch deployment on multi-user and shared systems. Additionally, restricting local user access to trusted users only can reduce the attack surface. Implementing strict user permissions and isolating critical services from untrusted users helps mitigate exploitation risk. Monitoring D-Bus traffic for anomalous or unexpected signals may provide early detection of attempted spoofing. For environments where immediate patching is not feasible, consider disabling or limiting the use of GDBus-based clients subscribing to signals from sensitive system services. Employing containerization or sandboxing for applications relying on D-Bus can also reduce the impact of spoofed signals. Finally, educating system administrators about the risks of local privilege misuse and enforcing strong access controls on shared systems is essential.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-05-02T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b4eff58c9332ff0738c

Added to database: 11/4/2025, 5:43:42 PM

Last enriched: 11/4/2025, 5:54:13 PM

Last updated: 11/5/2025, 2:15:25 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats