CVE-2013-4419

Severity

68%

Complexity

32%

Confidentiality

165%

The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.

The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.

CVSS 2.0 Base Score 6.8. CVSS Attack Vector: adjacent_network. CVSS Attack Complexity: high. CVSS Vector: (AV:A/AC:H/Au:N/C:C/I:C/A:C).

Overview

First reported 11 years ago

2013-11-05 20:55:00

Last updated 6 years ago

2018-12-13 17:57:00

Affected Software

SUSE Linux Enterprise Software Development Kit 11.0 Service Pack 3

11.0

Novell SUSE Linux Enterprise Server 11.0 Service Pack 3

11.0

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.