Vulnerability Description
RealtimeKit (aka rtkit) 0.5 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lennart Poettering | Rkit | 0.5 |
| Redhat | Enterprise Linux | 6.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00022.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00051.html
- http://rhn.redhat.com/errata/RHSA-2013-1282.html
- http://www.openwall.com/lists/oss-security/2013/09/18/6
- https://bugzilla.redhat.com/show_bug.cgi?id=1006677Patch
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00022.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00051.html
- http://rhn.redhat.com/errata/RHSA-2013-1282.html
- http://www.openwall.com/lists/oss-security/2013/09/18/6
- https://bugzilla.redhat.com/show_bug.cgi?id=1006677Patch
FAQ
What is CVE-2013-4326?
CVE-2013-4326 is a vulnerability with a CVSS score of 4.6 (MEDIUM). RealtimeKit (aka rtkit) 0.5 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess Pol...
How severe is CVE-2013-4326?
CVE-2013-4326 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-4326?
Check the references section above for vendor advisories and patch information. Affected products include: Lennart Poettering Rkit, Redhat Enterprise Linux.