CVE-2013-4288
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
03/10/2013
Last modified:
11/04/2025
Description
Race condition in PolicyKit (aka polkit) allows local users to bypass intended PolicyKit restrictions and gain privileges by starting a setuid or pkexec process before the authorization check is performed, related to (1) the polkit_unix_process_new API function, (2) the dbus API, or (3) the --process (unix-process) option for authorization to pkcheck.
Impact
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:polkit_project:polkit:*:*:*:*:*:*:*:* | 0.112.1 (excluding) | |
| cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1002375
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00004.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00005.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00062.html
- http://lists.opensuse.org/opensuse-updates/2013-11/msg00000.html
- http://rhn.redhat.com/errata/RHSA-2013-1270.html
- http://rhn.redhat.com/errata/RHSA-2013-1460.html
- http://seclists.org/oss-sec/2013/q3/626
- http://www.openwall.com/lists/oss-security/2013/09/18/4
- http://www.ubuntu.com/usn/USN-1953-1
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1002375
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00004.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00005.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00062.html
- http://lists.opensuse.org/opensuse-updates/2013-11/msg00000.html
- http://rhn.redhat.com/errata/RHSA-2013-1270.html
- http://rhn.redhat.com/errata/RHSA-2013-1460.html
- http://seclists.org/oss-sec/2013/q3/626
- http://www.openwall.com/lists/oss-security/2013/09/18/4
- http://www.ubuntu.com/usn/USN-1953-1



