CVE-2013-4324 — Race Condition in Spice-gtk
8 documents6 sources
Severity
4.6MEDIUMNVD
OSV7.2
EPSS
0.1%
top 80.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 3
Latest updateMay 14
Description
spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
CVSS vector
AV:L/AC:L/C:P/I:P/A:PExploitability: 3.9 | Impact: 6.4
Affected Packages3 packages
Also affects: Enterprise Linux 6.0
🔴Vulnerability Details
2📋Vendor Advisories
2💬Community
3Bugzilla▶
CVE-2013-4324 spice-gtk: Insecure calling of polkit via polkit_unix_process_new() [fedora-all]↗2013-09-18
Bugzilla
▶