4.6
CVSSv2

CVE-2013-4326

Published: 03/10/2013 Updated: 22/04/2019
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

RealtimeKit (aka rtkit) 0.5 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

lennart poettering rkit 0.5

redhat enterprise linux 6.0

Vendor Advisories

Synopsis Important: rtkit security update Type/Severity Security Advisory: Important Topic An updated rtkit package that fixes one security issue is now available forRed Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as havingimportant security impact A Common Vulnerability ...
Debian Bug report logs - #723714 rtkit: CVE-2013-4326 Package: rtkit; Maintainer for rtkit is Debian Multimedia Maintainers <debian-multimedia@listsdebianorg>; Source for rtkit is src:rtkit (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Thu, 19 Sep 2013 05:51:01 UTC Severity: grave Ta ...
RealtimeKit could be tricked into bypassing polkit authorizations ...
RealtimeKit (aka rtkit) 05 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288 ...