Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-4324

Опубликовано: 18 сент. 2013
Источник: redhat
CVSS2: 6.9
EPSS Низкий

Описание

spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7spice-gtkNot affected
Red Hat Enterprise Linux 6spice-gtkFixedRHSA-2013:127319.09.2013

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=1006669spice-gtk: Insecure calling of polkit via polkit_unix_process_new()

EPSS

Процентиль: 20%
0.00065
Низкий

6.9 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 12 лет назад

spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.

nvd
почти 12 лет назад

spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.

debian
почти 12 лет назад

spice-gtk 0.14, and possibly other versions, invokes the polkit author ...

github
больше 3 лет назад

spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.

oracle-oval
почти 12 лет назад

ELSA-2013-1273: spice-gtk security update (IMPORTANT)

EPSS

Процентиль: 20%
0.00065
Низкий

6.9 Medium

CVSS2