Vulnerability Description
libvirt 1.0.5.x before 1.0.5.6, 0.10.2.x before 0.10.2.8, and 0.9.12.x before 0.9.12.2 allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition in pkcheck via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Libvirt | 0.9.12 |
| Canonical | Ubuntu Linux | 10.04 |
| Redhat | Enterprise Linux | 6.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00023.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00024.html
- http://rhn.redhat.com/errata/RHSA-2013-1272.htmlVendor Advisory
- http://rhn.redhat.com/errata/RHSA-2013-1460.html
- http://wiki.libvirt.org/page/Maintenance_ReleasesPatch
- http://www.openwall.com/lists/oss-security/2013/09/18/6
- http://www.ubuntu.com/usn/USN-1954-1Vendor Advisory
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00023.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00024.html
- http://rhn.redhat.com/errata/RHSA-2013-1272.htmlVendor Advisory
- http://rhn.redhat.com/errata/RHSA-2013-1460.html
- http://wiki.libvirt.org/page/Maintenance_ReleasesPatch
- http://www.openwall.com/lists/oss-security/2013/09/18/6
- http://www.ubuntu.com/usn/USN-1954-1Vendor Advisory
FAQ
What is CVE-2013-4311?
CVE-2013-4311 is a vulnerability with a CVSS score of 4.6 (MEDIUM). libvirt 1.0.5.x before 1.0.5.6, 0.10.2.x before 0.10.2.8, and 0.9.12.x before 0.9.12.2 allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race co...
How severe is CVE-2013-4311?
CVE-2013-4311 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-4311?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Libvirt, Canonical Ubuntu Linux, Redhat Enterprise Linux.