Vulnerability Name: | CVE-2013-4324 (CCN-87339) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2013-09-18 | ||||||||||||||||||||||||||||||||||||
Published: | 2013-09-18 | ||||||||||||||||||||||||||||||||||||
Updated: | 2019-06-17 | ||||||||||||||||||||||||||||||||||||
Summary: | spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P) 3.4 Low (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
1.6 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
5.1 Medium (REDHAT Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-264 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2013-4324 Source: SUSE Type: UNKNOWN openSUSE-SU-2013:1562 Source: REDHAT Type: Vendor Advisory RHSA-2013:1273 Source: SECUNIA Type: Vendor Advisory 54947 Source: CCN Type: spice-gtk Web site Spice-Gtk - Spice Source: MLIST Type: UNKNOWN [oss-security] 20130918 Re: Fwd: [vs-plain] polkit races Source: BID Type: UNKNOWN 62538 Source: CCN Type: BID-62538 Red Hat 'spice-gtk' Module CVE-2013-4324 Local Security Bypass Vulnerability Source: CCN Type: Red Hat Bugzilla Bug 1006669 CVE-2013-4324 spice-gtk: Insecure calling of polkit via polkit_unix_process_new() Source: XF Type: UNKNOWN spicegtk-cve20134324-security-bypass(87339) | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: ![]() | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |