CVE-2013-6409
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
07/12/2013
Last modified:
11/04/2025
Description
Debian adequate before 0.8.1, when run by root with the --user option, allows local users to hijack the tty and possibly gain privileges via the TIOCSTI ioctl.
Impact
Base Score 2.0
6.20
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:debian:adequate:*:*:*:*:*:*:*:* | 0.8 (including) | |
| cpe:2.3:a:debian:adequate:0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:adequate:0.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:adequate:0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:adequate:0.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:adequate:0.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:adequate:0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:adequate:0.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:adequate:0.4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:adequate:0.4.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:adequate:0.4.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:adequate:0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:adequate:0.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:adequate:0.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:debian:adequate:0.5.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730691
- http://www.securityfocus.com/bid/63994
- https://bitbucket.org/jwilk/adequate/raw/tip/debian/changelog
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730691
- http://www.securityfocus.com/bid/63994
- https://bitbucket.org/jwilk/adequate/raw/tip/debian/changelog



