[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2013-2231

Date: (C)2013-10-09   (M)2016-04-05
 
CVSS Score: 7.2Access Vector: LOCAL
Exploitability Subscore: 3.9Access Complexity: LOW
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Unquoted Windows search path vulnerability in the QEMU Guest Agent service for Red Hat Enterprise Linux Desktop 6, HPC Node 6, Server 6, Workstation 6, Desktop Supplementary 6, Server Supplementary 6, Supplementary AUS 6.4, Supplementary EUS 6.4.z, and Workstation Supplementary 6, when installing on Windows, allows local users to gain privileges via a crafted program in an unspecified folder.

Reference:
RHSA-2013:1100
RHSA-2013:1101
https://bugzilla.redhat.com/show_bug.cgi?id=980757

CPE    6
cpe:/o:redhat:enterprise_linux_server_supplementary:6.4
cpe:/o:redhat:enterprise_linux_server_supplementary:6.4.z
cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0
cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0
...
CWE    1
CWE-399
OVAL    4
oval:org.secpod.oval:def:202930
oval:org.secpod.oval:def:1500214
oval:org.secpod.oval:def:501077
oval:org.secpod.oval:def:1500304
...

© 2013 SecPod Technologies