[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

251139

 
 

909

 
 

196159

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2023-2023-026 --- polkit

ID: oval:org.secpod.oval:def:19500126Date: (C)2023-06-12   (M)2024-04-17
Class: PATCHFamily: unix




A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine. There is a flaw in polkit which can allow an unprivileged user to cause polkit to crash, due to process file descriptor exhaustion. The highest threat from this vulnerability is to availability. NOTE: Polkit process outage duration is tied to the failing process being reaped and a new one being spawned

Platform:
Amazon Linux 2023
Product:
polkit
Reference:
ALAS2023-2023-026
CVE-2021-4034
CVE-2021-4115
CVE    2
CVE-2021-4115
CVE-2021-4034
CPE    1
cpe:/a:freedesktop:polkit

© SecPod Technologies