First published: Thu Oct 03 2013(Updated: )
apt-xapian-index before 0.45ubuntu2.1, 0.44ubuntu7.1, and 0.44ubuntu5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
apt-xapian-index | >=0.45ubuntu1<0.45ubuntu2.1 | |
apt-xapian-index | =0.44ubuntu5.1 | |
apt-xapian-index | =0.44ubuntu7.1 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 | |
Ubuntu Linux | =13.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1064 is rated as a high-severity vulnerability due to its potential for local privilege escalation.
To fix CVE-2013-1064, update to apt-xapian-index version 0.45ubuntu2.1 or later, or apply patches provided in your distribution.
CVE-2013-1064 affects users of Ubuntu Linux versions 12.04, 12.10, and 13.04 that are running affected versions of apt-xapian-index.
CVE-2013-1064 cannot be exploited remotely as it requires local user access to take advantage of the vulnerability.
Exploitation of CVE-2013-1064 could allow a local user to bypass access restrictions and potentially gain elevated privileges on the system.