Lucene search

K
cve[email protected]CVE-2013-1958
HistoryApr 24, 2013 - 7:55 p.m.

CVE-2013-1958

2013-04-2419:55:01
CWE-264
web.nvd.nist.gov
31
cve-2013-1958
linux kernel
net/core/scm.c
capability requirements
pid value
unix domain socket
access restrictions
nvd

1.9 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:M/Au:N/C:N/I:P/A:N

6.2 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%

The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.8.6 does not properly enforce capability requirements for controlling the PID value associated with a UNIX domain socket, which allows local users to bypass intended access restrictions by leveraging the time interval during which a user namespace has been created but a PID namespace has not been created.

Affected configurations

NVD
Node
linuxlinux_kernelRangeโ‰ค3.8.5
OR
linuxlinux_kernelMatch3.8.0
OR
linuxlinux_kernelMatch3.8.1
OR
linuxlinux_kernelMatch3.8.2
OR
linuxlinux_kernelMatch3.8.3
OR
linuxlinux_kernelMatch3.8.4

1.9 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:M/Au:N/C:N/I:P/A:N

6.2 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%