CVE-2013-4325Race Condition in Hplip

CWE-2649 documents7 sources
Severity
6.9MEDIUMNVD
EPSS
0.1%
top 79.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 23
Latest updateMay 17

Description

The check_permission_v1 function in base/pkit.py in HP Linux Imaging and Printing (HPLIP) through 3.13.9 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process.

CVSS vector

AV:L/AC:M/C:C/I:C/A:CExploitability: 3.4 | Impact: 10.0

Affected Packages2 packages

debiandebian/hplip< hplip 3.13.9-1 (bookworm)

🔴Vulnerability Details

2
GHSA
GHSA-7hxg-9wxx-g3mp: The check_permission_v1 function in base/pkit2022-05-17
OSV
CVE-2013-4325: The check_permission_v1 function in base/pkit2013-09-23

📋Vendor Advisories

3
Ubuntu
HPLIP vulnerability2013-09-18
Red Hat
hplip: Insecure calling of polkit2013-09-18
Debian
CVE-2013-4325: hplip - The check_permission_v1 function in base/pkit.py in HP Linux Imaging and Printin...2013

💬Community

3
Bugzilla
CVE-2013-4325 hplip: Insecure calling of polkit [fedora-all]2013-09-18
Bugzilla
CVE-2013-4325 hplip: Insecure calling of polkit2013-09-11
Bugzilla
CVE-2013-4288 polkit: unix-process subject for authorization is racy2013-08-29