CVE-2013-1060

MEDIUM

Description

A certain Ubuntu build procedure for perf, as distributed in the Linux kernel packages in Ubuntu 10.04 LTS, 12.04 LTS, 12.10, 13.04, and 13.10, sets the HOME environment variable to the ~buildd directory and consequently reads the system configuration file from the ~buildd directory, which allows local users to gain privileges by leveraging control over the buildd account.

References

http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-1060.html

http://www.ubuntu.com/usn/USN-1938-1

http://www.ubuntu.com/usn/USN-1939-1

http://www.ubuntu.com/usn/USN-1941-1

http://www.ubuntu.com/usn/USN-1942-1

http://www.ubuntu.com/usn/USN-1943-1

http://www.ubuntu.com/usn/USN-1944-1

http://www.ubuntu.com/usn/USN-1945-1

http://www.ubuntu.com/usn/USN-1946-1

http://www.ubuntu.com/usn/USN-1947-1

https://launchpad.net/bugs/1206200

https://lists.ubuntu.com/archives/kernel-team/2013-July/031248.html

https://lists.ubuntu.com/archives/kernel-team/2013-July/031249.html

Details

Source: MITRE

Published: 2013-09-25

Updated: 2013-10-02

Type: CWE-264

Risk Information

CVSS v2.0

Base Score: 6.9

Vector: (AV:L/AC:M/Au:N/C:C/I:C/A:C)

Impact Score: 10

Exploitability Score: 3.4

Severity: MEDIUM