First published: Tue Oct 02 2012(Updated: )
A possibility of unauthorized Xorg X11 Server configuration file modification / injection was found in the way SetX11Keyboard() method of systemd, a system and service manager, performed sanitization of provided X Keyboard Extension (XKB) layouts description (special and control characters were not filtered out from the layout description properly). When the host in question used PolicyKit Local Authority (PKLA) file mechanism to grant group of users the privilege to change XKB settings (instead of default PolicyKit check) and particular local attacker was member of that group, they could use this flaw to inject arbitrary values into the Xorg X11 Server configuration file, possibly leading to escalation of their privileges. Issue found by Florian Weimer, Red Hat Product Security Team
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
systemd | <194 | |
Debian GNU/Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4394 is considered a medium severity vulnerability due to the potential for unauthorized configuration file modification.
To fix CVE-2013-4394, upgrade systemd to version 194 or later, or apply the appropriate security patches for your system.
CVE-2013-4394 affects systemd versions prior to 194 and Debian GNU/Linux version 7.0.
The exploit vector for CVE-2013-4394 involves unauthorized modification or injection into the Xorg X11 Server configuration files.
CVE-2013-4394 is a configuration injection vulnerability that affects the sanitization processes in the SetX11Keyboard() method.