Mandriva Linux Security Advisory : polkit (MDVSA-2013:243)

high Nessus Plugin ID 70185

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Updated polkit packages fix security vulnerability :

A race condition was found in the way the PolicyKit pkcheck utility checked process authorization when the process was specified by its process ID via the --process option. A local user could use this flaw to bypass intended PolicyKit authorizations and escalate their privileges (CVE-2013-4288).

Note: Applications that invoke pkcheck with the --process option need to be modified to use the pid,pid-start-time,uid argument for that option, to allow pkcheck to check process authorization correctly.

Because of the change in the PolicyKit API, hplip (CVE-2013-4325), rtkit (CVE-2013-4326), and systemd (CVE-2013-4327) packages have been updated to use a different API that is not affected by this PolicyKit vulnerability.

Solution

Update the affected packages.

See Also

https://bugs.mageia.org/show_bug.cgi?id=11260

Plugin Details

Severity: High

ID: 70185

File Name: mandriva_MDVSA-2013-243.nasl

Version: 1.8

Type: local

Published: 9/28/2013

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:polkit, p-cpe:/a:mandriva:linux:polkit-desktop-policy, p-cpe:/a:mandriva:linux:hplip, p-cpe:/a:mandriva:linux:hplip-doc, p-cpe:/a:mandriva:linux:hplip-hpijs, p-cpe:/a:mandriva:linux:hplip-hpijs-ppds, p-cpe:/a:mandriva:linux:hplip-model-data, p-cpe:/a:mandriva:linux:lib64hpip0, p-cpe:/a:mandriva:linux:lib64hpip0-devel, p-cpe:/a:mandriva:linux:lib64polkit-gir1.0, p-cpe:/a:mandriva:linux:rtkit, p-cpe:/a:mandriva:linux:systemd, p-cpe:/a:mandriva:linux:systemd-sysvinit, p-cpe:/a:mandriva:linux:systemd-tools, p-cpe:/a:mandriva:linux:systemd-units, cpe:/o:mandriva:business_server:1, p-cpe:/a:mandriva:linux:lib64polkit1-devel, p-cpe:/a:mandriva:linux:lib64polkit1_0, p-cpe:/a:mandriva:linux:lib64sane-hpaio1, p-cpe:/a:mandriva:linux:lib64systemd-daemon0, p-cpe:/a:mandriva:linux:lib64systemd-daemon0-devel, p-cpe:/a:mandriva:linux:lib64systemd-id1280, p-cpe:/a:mandriva:linux:lib64systemd-id1280-devel, p-cpe:/a:mandriva:linux:lib64systemd-journal0, p-cpe:/a:mandriva:linux:lib64systemd-journal0-devel, p-cpe:/a:mandriva:linux:lib64systemd-login0, p-cpe:/a:mandriva:linux:lib64systemd-login0-devel

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 9/27/2013

Reference Information

CVE: CVE-2013-4288, CVE-2013-4325, CVE-2013-4326, CVE-2013-4327

BID: 62499, 62503, 62505, 62511

MDVSA: 2013:243