Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-9fgm-rkzm-1uhw
Vulnerability ID VCID-9fgm-rkzm-1uhw
Aliases CVE-2013-2168
Summary A vulnerability has been found in D-Bus which allows a local user to cause a Denial of Service.
Status Published
Exploitability 0.5
Weighted Severity 1.7
Risk 0.8
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
http://cgit.freedesktop.org/dbus/dbus/commit/?id=954d75b2b64e4799f360d2a6bf9cff6d9fee37e7
http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109896.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-June/110114.html
http://lists.freedesktop.org/archives/dbus/2013-June/015696.html
http://lists.opensuse.org/opensuse-updates/2013-07/msg00003.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2168.json
https://api.first.org/data/v1/epss?cve=CVE-2013-2168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2168
http://secunia.com/advisories/53317
http://secunia.com/advisories/53832
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16881
http://www.debian.org/security/2013/dsa-2707
http://www.mandriva.com/security/advisories?name=MDVSA-2013:177
http://www.openwall.com/lists/oss-security/2013/06/13/2
http://www.securityfocus.com/bid/60546
http://www.securitytracker.com/id/1028667
http://www.ubuntu.com/usn/USN-1874-1
974109 https://bugzilla.redhat.com/show_bug.cgi?id=974109
cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:freedesktop:dbus:1.7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:dbus:1.7.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
CVE-2013-2168 https://nvd.nist.gov/vuln/detail/CVE-2013-2168
GLSA-201308-02 https://security.gentoo.org/glsa/201308-02
USN-1874-1 https://usn.ubuntu.com/1874-1/
No exploits are available.
Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2013-2168
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.25758
EPSS Score 0.00091
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:04:29.804506+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/201308-02 38.0.0