First published: Mon Oct 26 2015(Updated: )
Integer overflow in the authentication_agent_new_cookie function in PolicyKit (aka polkit) before 0.113 allows local users to gain privileges by creating a large number of connections, which triggers the issuance of a duplicate cookie value.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fedoraproject Fedora | =21 | |
Fedoraproject Fedora | =22 | |
openSUSE openSUSE | =13.1 | |
openSUSE openSUSE | =13.2 | |
Polkit Project Polkit | <=0.112 | |
debian/policykit-1 | 0.105-31+deb11u1 122-3 125-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-4625 is medium with a CVSS score of 4.6.
The affected software includes Fedora 21, Fedora 22, OpenSUSE 13.1, OpenSUSE 13.2, and Red Hat Polkit.
Local users can exploit CVE-2015-4625 by creating a large number of connections, triggering the issuance of a duplicate cookie value and gaining privileges.
Yes, there is a fix available for CVE-2015-4625. Upgrade to version 0.113 or higher of PolicyKit (aka polkit).
Yes, you can refer to the following links for more information: [link1](http://www.openwall.com/lists/oss-security/2015/06/08/3), [link2](http://www.openwall.com/lists/oss-security/2015/06/09/1), [link3](http://www.openwall.com/lists/oss-security/2015/06/16/21).