Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-3560

Опубликовано: 16 фев. 2022
Источник: debian
EPSS Низкий

Описание

It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
policykit-1fixed0.105-31package
policykit-1not-affectedbusterpackage
policykit-1not-affectedstretchpackage

Примечания

  • Issue Upstream introduced in 0.113 with https://gitlab.freedesktop.org/polkit/polkit/-/commit/bfa5036bfb93582c5a87c44b847957479d911e38

  • Debian backported 0.113 commits in 0.105-26

  • Fixed by: https://gitlab.freedesktop.org/polkit/polkit/-/commit/a04d13affe0fa53ff618e07aa8f57f4c0e3b9b81 (0.119)

  • https://gitlab.freedesktop.org/polkit/polkit/-/issues/140

  • https://bugzilla.redhat.com/show_bug.cgi?id=1961710

  • https://www.openwall.com/lists/oss-security/2021/06/03/1

  • https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/

EPSS

Процентиль: 89%
0.04535
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 3 лет назад

It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 7.8
redhat
около 4 лет назад

It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 7.8
nvd
больше 3 лет назад

It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

suse-cvrf
почти 4 года назад

Security update for polkit

suse-cvrf
около 4 лет назад

Security update for polkit

EPSS

Процентиль: 89%
0.04535
Низкий