CVE-2013-4324Race Condition in Spice-gtk

8 documents6 sources
Severity
4.6MEDIUMNVD
OSV7.2
EPSS
0.1%
top 80.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 3
Latest updateMay 14

Description

spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.

CVSS vector

AV:L/AC:L/C:P/I:P/A:PExploitability: 3.9 | Impact: 6.4

Affected Packages3 packages

debiandebian/spice-gtk< spice-gtk 0.21-0nocelt1 (bookworm)
Debianspice-gtk_project/spice-gtk< 0.21-0nocelt1+3

Also affects: Enterprise Linux 6.0

🔴Vulnerability Details

2
GHSA
GHSA-4qg9-qqgj-hw85: spice-gtk 02022-05-14
OSV
CVE-2013-4324: spice-gtk 02013-10-03

📋Vendor Advisories

2
Red Hat
spice-gtk: Insecure calling of polkit via polkit_unix_process_new()2013-09-18
Debian
CVE-2013-4324: spice-gtk - spice-gtk 0.14, and possibly other versions, invokes the polkit authority using ...2013

💬Community

3
Bugzilla
CVE-2013-4324 spice-gtk: Insecure calling of polkit via polkit_unix_process_new() [fedora-all]2013-09-18
Bugzilla
CVE-2013-4324 spice-gtk: Insecure calling of polkit via polkit_unix_process_new()2013-09-11
Bugzilla
CVE-2013-4288 polkit: unix-process subject for authorization is racy2013-08-29