6.2
CVSSv2

CVE-2013-6409

Published: 07/12/2013 Updated: 09/12/2013
CVSS v2 Base Score: 6.2 | Impact Score: 10 | Exploitability Score: 1.9
VMScore: 552
Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

Debian adequate prior to 0.8.1, when run by root with the --user option, allows local users to hijack the tty and possibly gain privileges via the TIOCSTI ioctl.

Vulnerable Product Search on Vulmon Subscribe to Product

debian adequate

debian adequate 0.7.1

debian adequate 0.7

debian adequate 0.2

debian adequate 0.1.1

debian adequate 0.1

debian adequate 0.5

debian adequate 0.4.4

debian adequate 0.4.3

debian adequate 0.4.2

debian adequate 0.6

debian adequate 0.5.2

debian adequate 0.4

debian adequate 0.2.1

debian adequate 0.5.3

debian adequate 0.5.1

debian adequate 0.4.1

debian adequate 0.3.1

Vendor Advisories

Debian Bug report logs - #730691 adequate: CVE-2013-6409: privilege escalation via tty hijacking Package: adequate; Maintainer for adequate is Debian QA Group <packages@qadebianorg>; Source for adequate is src:adequate (PTS, buildd, popcon) Reported by: Jakub Wilk <jwilk@debianorg> Date: Thu, 28 Nov 2013 09:57:01 ...