CVE-2013-4325
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
23/09/2013
Last modified:
11/04/2025
Description
The check_permission_v1 function in base/pkit.py in HP Linux Imaging and Printing (HPLIP) through 3.13.9 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process.
Impact
Base Score 2.0
6.90
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:hp:linux_imaging_and_printing_project:1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:hp:linux_imaging_and_printing_project:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:hp:linux_imaging_and_printing_project:2.7.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4b:*:*:*:*:*:*:* | ||
| cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00062.html
- http://lists.opensuse.org/opensuse-updates/2013-11/msg00000.html
- http://rhn.redhat.com/errata/RHSA-2013-1274.html
- http://www.debian.org/security/2013/dsa-2829
- http://www.ubuntu.com/usn/USN-1956-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1002375
- https://bugzilla.redhat.com/show_bug.cgi?id=1006674
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00062.html
- http://lists.opensuse.org/opensuse-updates/2013-11/msg00000.html
- http://rhn.redhat.com/errata/RHSA-2013-1274.html
- http://www.debian.org/security/2013/dsa-2829
- http://www.ubuntu.com/usn/USN-1956-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1002375
- https://bugzilla.redhat.com/show_bug.cgi?id=1006674



