Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-4324

Опубликовано: 03 окт. 2013
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.6

Описание

spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.

РелизСтатусПримечание
devel

not-affected

0.22-0nocent2
esm-apps/xenial

not-affected

0.22-0nocent2
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [0.22-0nocent2]]
lucid

DNE

precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

ignored

end of life
raring

ignored

end of life
saucy

ignored

end of life
trusty

not-affected

0.22-0nocent2

Показывать по

Ссылки на источники

EPSS

Процентиль: 20%
0.00065
Низкий

4.6 Medium

CVSS2

Связанные уязвимости

redhat
почти 12 лет назад

spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.

nvd
почти 12 лет назад

spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.

debian
почти 12 лет назад

spice-gtk 0.14, and possibly other versions, invokes the polkit author ...

github
больше 3 лет назад

spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.

oracle-oval
почти 12 лет назад

ELSA-2013-1273: spice-gtk security update (IMPORTANT)

EPSS

Процентиль: 20%
0.00065
Низкий

4.6 Medium

CVSS2