7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
polkit is vulnerable to privilege escalation. A race condition in the PolicyKit pkcheck
utility when the process is specified by its process ID via the --process
option, allows a local user to bypass intended authorization and escalate their privileges by starting a setuid
or pkexec
process before the authorization check is performed.
CPE | Name | Operator | Version |
---|---|---|---|
polkit | eq | 0.96__2.el6_0.1 | |
polkit | eq | 0.96__2.el6 | |
polkit | eq | 0.96__2.el6_0.1 | |
polkit | eq | 0.96__2.el6 |
bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1002375
lists.opensuse.org/opensuse-updates/2013-10/msg00004.html
lists.opensuse.org/opensuse-updates/2013-10/msg00005.html
lists.opensuse.org/opensuse-updates/2013-10/msg00062.html
lists.opensuse.org/opensuse-updates/2013-11/msg00000.html
rhn.redhat.com/errata/RHSA-2013-1270.html
rhn.redhat.com/errata/RHSA-2013-1460.html
seclists.org/oss-sec/2013/q3/626
www.openwall.com/lists/oss-security/2013/09/18/4
www.ubuntu.com/usn/USN-1953-1
access.redhat.com/errata/RHSA-2013:1270
access.redhat.com/security/cve/CVE-2013-4288
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1002375
rhn.redhat.com/errata/RHSA-2013-1270.html