First published: Wed Jul 03 2013(Updated: )
An unquoted search path flaw was found in the way qemu guest agent service for Windows was installed into the system. A local unprivileged user could use this flaw to increase their privileges. References: <a href="http://cwe.mitre.org/data/definitions/428.html">http://cwe.mitre.org/data/definitions/428.html</a> Acknowledgements: This issue was discovered by Lev Veyde of Red Hat.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server Supplementary | =6.0 | |
Red Hat Enterprise Linux Server Supplementary | =6.4 | |
Red Hat Enterprise Linux Server Supplementary | =6.4.z | |
Red Hat Enterprise Linux Workstation Supplementary | =6.0 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2231 is considered a medium severity vulnerability due to its potential for privilege escalation.
To fix CVE-2013-2231, ensure that the qemu guest agent service for Windows is installed with a properly quoted path.
CVE-2013-2231 affects users of Red Hat Enterprise Linux versions 6.0 and 6.4, as well as their desktop and workstation supplementary releases.
Yes, a local unprivileged user can exploit CVE-2013-2231 to increase their privileges on affected systems.
CVE-2013-2231 is not relevant for Microsoft Windows systems, as it specifically pertains to the qemu guest agent service on Linux.