MEDIUM · 6.8

CVE-2013-4419

The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary s...

Vulnerability Description

The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.

CVSS Score

6.8

MEDIUM

AV:A/AC:H/Au:N/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
LibguestfsLibguestfs>= 1.20.0, <= 1.20.12
SuseSuse Linux Enterprise Software Development Kit11.0
NovellSuse Linux Enterprise Server11.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2013-4419?

CVE-2013-4419 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary s...

How severe is CVE-2013-4419?

CVE-2013-4419 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2013-4419?

Check the references section above for vendor advisories and patch information. Affected products include: Libguestfs Libguestfs, Suse Suse Linux Enterprise Software Development Kit, Novell Suse Linux Enterprise Server.