3.3
CVSSv2

CVE-2013-4392

Published: 28/10/2013 Updated: 31/01/2022
CVSS v2 Base Score: 3.3 | Impact Score: 4.9 | Exploitability Score: 3.4
VMScore: 295
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

systemd project systemd

Vendor Advisories

Debian Bug report logs - #725357 CVE-2013-4392: TOCTOU race condition when updating file permissions and SELinux security contexts Package: systemd; Maintainer for systemd is Debian systemd Maintainers <pkg-systemd-maintainers@listsaliothdebianorg>; Source for systemd is src:systemd (PTS, buildd, popcon) Reported by: Mori ...
systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files ...

Github Repositories

Compare data from multiple vulnerability scanners to get a more complete picture of potential exposures.

vimp Compare data from multiple vulnerability scanners to get a more complete picture of potential exposures vimp CLI currently supports output from common open source vulnerability scanners like grype, snyk, and trivy The CLI also comes with an embedded data store (sqlite) and support for other databases, like BigQuery Alternatively, vimp can also output to local file (JSON

Compare data from multiple vulnerability scanners to get a more complete picture of potential exposures.

vimp Compare data from multiple vulnerability scanners to get a more complete picture of potential exposures vimp CLI currently supports output from common open source vulnerability scanners like grype, snyk, and trivy The CLI also comes with an embedded data store (sqlite) and support for other databases, like BigQuery Alternatively, vimp can also output to local file (JSON