[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-4419Date: (C)2013-11-10   (M)2023-12-22


The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.8
Exploit Score: 3.2
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: ADJACENT_NETWORK
Access Complexity: HIGH
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECUNIA-55813
RHSA-2013:1536
SUSE-SU-2013:1626
https://www.redhat.com/archives/libguestfs/2013-October/msg00031.html
https://bugzilla.redhat.com/show_bug.cgi?id=1016960

CPE    3
cpe:/a:libguestfs:libguestfs
cpe:/o:novell:suse_linux_enterprise_server:11.0:sp3
cpe:/a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3
CWE    1
CWE-264
OVAL    5
oval:org.secpod.oval:def:106052
oval:org.secpod.oval:def:106062
oval:org.secpod.oval:def:1500315
oval:org.secpod.oval:def:501144
...

© SecPod Technologies