The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct unspecified state-modification attacks via crafted messages.
bugs.debian.org/cgi-bin/bugreport.cgi?bug=629938
cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.2&id=6519a1f77c61d753d4c97efd6e15630eb275336e
cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
cgit.freedesktop.org/dbus/dbus/tree/NEWS?h=dbus-1.2
cgit.freedesktop.org/dbus/dbus/tree/NEWS?h=dbus-1.4
kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
lists.freedesktop.org/archives/dbus/2007-March/007357.html
lists.freedesktop.org/archives/dbus/2011-May/014408.html
openwall.com/lists/oss-security/2011/06/12/1
openwall.com/lists/oss-security/2011/06/12/2
openwall.com/lists/oss-security/2011/06/13/12
secunia.com/advisories/44896
www.redhat.com/support/errata/RHSA-2011-1132.html
bugs.freedesktop.org/show_bug.cgi?id=38120
bugzilla.redhat.com/show_bug.cgi?id=712676
exchange.xforce.ibmcloud.com/vulnerabilities/67974