spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2013-4324 from the MITRE CVE dictionary dictionary and NIST NVD.
Base Score | 6.9 |
---|---|
Base Metrics | AV:L/AC:M/Au:N/C:C/I:C/A:C |
Access Vector | Local |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Complete |
Integrity Impact | Complete |
Availability Impact | Complete |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 6 (spice-gtk) | RHSA-2013:1273 | 2013-09-19 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 7 | spice-gtk | Not affected |