Impact
Malicious peers on the same D‑Bus can impersonate the owner of a well‑known name and send forged signals, overwhelm the application with an excessive number of Unix file descriptors, or deliver malformed message bodies that trigger unhandled exceptions, all of which can cause the application to crash or misbehave.
Affected Systems
The vulnerability affects the Tmds.DBus and Tmds.DBus.Protocol .NET libraries. Versions prior to 0.92.0 for Tmds.DBus and prior to 0.21.3 for Tmds.DBus.Protocol are susceptible.
Risk and Exploitability
With a CVSS score of 7.1 the issue is high severity. No EPSS score is available and the vulnerability is not listed in the KEV catalog. Exploitation requires a malicious peer on the same bus, so the risk is chiefly local or in environments where untrusted applications can attach to the bus. Successful exploitation can lead to resource exhaustion, application crashes, and the delivery of deceptive signals to components that trust the bus.
OpenCVE Enrichment
Github GHSA