Vulnerability Description
spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Spice-Gtk Project | Spice-Gtk | 0.14 |
| Redhat | Enterprise Linux | 6.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00031.html
- http://rhn.redhat.com/errata/RHSA-2013-1273.htmlVendor Advisory
- http://secunia.com/advisories/54947Vendor Advisory
- http://www.openwall.com/lists/oss-security/2013/09/18/6
- http://www.securityfocus.com/bid/62538
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00031.html
- http://rhn.redhat.com/errata/RHSA-2013-1273.htmlVendor Advisory
- http://secunia.com/advisories/54947Vendor Advisory
- http://www.openwall.com/lists/oss-security/2013/09/18/6
- http://www.securityfocus.com/bid/62538
FAQ
What is CVE-2013-4324?
CVE-2013-4324 is a vulnerability with a CVSS score of 4.6 (MEDIUM). spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by le...
How severe is CVE-2013-4324?
CVE-2013-4324 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-4324?
Check the references section above for vendor advisories and patch information. Affected products include: Spice-Gtk Project Spice-Gtk, Redhat Enterprise Linux.