CVE-2013-6409

Severity CVSS v4.0:
Pending analysis
Type:
CWE-264 Permissions, Privileges, and Access Control
Publication date:
07/12/2013
Last modified:
11/04/2025

Description

Debian adequate before 0.8.1, when run by root with the --user option, allows local users to hijack the tty and possibly gain privileges via the TIOCSTI ioctl.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:debian:adequate:*:*:*:*:*:*:*:* 0.8 (including)
cpe:2.3:a:debian:adequate:0.1:*:*:*:*:*:*:*
cpe:2.3:a:debian:adequate:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:debian:adequate:0.2:*:*:*:*:*:*:*
cpe:2.3:a:debian:adequate:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:debian:adequate:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:debian:adequate:0.4:*:*:*:*:*:*:*
cpe:2.3:a:debian:adequate:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:debian:adequate:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:debian:adequate:0.4.3:*:*:*:*:*:*:*
cpe:2.3:a:debian:adequate:0.4.4:*:*:*:*:*:*:*
cpe:2.3:a:debian:adequate:0.5:*:*:*:*:*:*:*
cpe:2.3:a:debian:adequate:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:debian:adequate:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:debian:adequate:0.5.3:*:*:*:*:*:*:*