First published: Thu Aug 29 2013(Updated: )
Race condition in PolicyKit (aka polkit) allows local users to bypass intended PolicyKit restrictions and gain privileges by starting a setuid or pkexec process before the authorization check is performed, related to (1) the polkit_unix_process_new API function, (2) the dbus API, or (3) the --process (unix-process) option for authorization to pkcheck.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =12.2 | |
SUSE Linux | =12.3 | |
Ubuntu Polkit Daemon | <0.112.1 | |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.04 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4288 has a high severity rating due to its potential to allow local users to bypass PolicyKit restrictions.
To fix CVE-2013-4288, update to the latest version of polkit or apply the appropriate patches provided for your operating system.
CVE-2013-4288 affects OpenSUSE versions 12.2 and 12.3, Ubuntu versions 10.04, 12.04, 12.10, 13.04, and Red Hat Enterprise Linux 6.0.
CVE-2013-4288 can be exploited by local users who can start setuid or pkexec processes before the authorization check.
The implications of CVE-2013-4288 include unauthorized privilege escalation, allowing attackers to gain higher system access.