Page 2 of 14 results (0.012 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

In gksu-polkit before 0.0.3, the source file for xauth may contain arbitrary commands that may allow an attacker to overtake an administrator X11 session. En gksu-polkit versiones anteriores a la versión 0.0.3, el archivo fuente de xauth puede contener comandos arbitrarios que pueden permitir a un atacante superar una sesión X11 de administrador. • https://access.redhat.com/security/cve/cve-2011-0703 https://security-tracker.debian.org/tracker/CVE-2011-0703 • CWE-20: Improper Input Validation •

CVSS: 7.3EPSS: 0%CPEs: 17EXPL: 0

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c. En PolicyKit (también conocido como polkit) 0.115, el mecanismo de protección "start time" puede omitirse debido a que fork() no es atómico y, por lo tanto, las decisiones de autorización se cachean incorrectamente. Esto está relacionado con la falta de comprobación de uid en polkitbackend/polkitbackendinteractiveauthority.c. A vulnerability was found in polkit. • http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00049.html http://www.securityfocus.com/bid/106537 https://access.redhat.com/errata/RHSA-2019:0230 https://access.redhat.com/errata/RHSA-2019:0420 https://access.redhat.com/errata/RHSA-2019:0832 https://access.redhat.com/errata/RHSA-2019:2699 https://access.redhat.com/errata/RHSA-2019:2978 https://bugs.chromium.org/p/project-zero/issues/detail?id=1692 https://git.kernel.org/linus/7b55851367136b1efd84d98fea81ba57a98304cf https • CWE-284: Improper Access Control CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 9.0EPSS: 0%CPEs: 8EXPL: 4

A flaw was found in PolicyKit (aka polkit) 0.115 that allows a user with a uid greater than INT_MAX to successfully execute any systemctl command. Se ha detectado un fallo en PolicyKit (también conocido como polkit) 0.115 que permite que un usuario con una uid mayor que INT_MAX ejecute con éxito cualquier comando systemctl. • https://github.com/AbsoZed/CVE-2018-19788 https://github.com/d4gh0s7/CVE-2018-19788 https://github.com/jhlongjr/CVE-2018-19788 https://access.redhat.com/errata/RHSA-2019:2046 https://access.redhat.com/errata/RHSA-2019:3232 https://bugs.debian.org/915332 https://gitlab.freedesktop.org/polkit/polkit/issues/74 https://lists.debian.org/debian-lts-announce/2019/01/msg00021.html https://security.gentoo.org/glsa/201908-14 https://usn.ubuntu.com/3861-1 https://usn.ubu • CWE-20: Improper Input Validation CWE-287: Improper Authentication •

CVSS: 4.7EPSS: 0%CPEs: 3EXPL: 0

A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. Se ha descubierto un problema en versiones anteriores a la 0.116 de polkit. La implementación de la función polkit_backend_interactive_authority_check_authorization en polkitd permite probar la autenticación y desencadenar la autenticación de procesos no relacionados propiedad de otros usuarios. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1116 https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 https://lists.debian.org/debian-lts-announce/2018/07/msg00042.html https://security.gentoo.org/glsa/201908-14 https://usn.ubuntu.com/3717-2 https://access.redhat.com/security/cve/CVE-2018-1116 https://bugzilla.redhat.com/show_bug.cgi?id=1595404 • CWE-285: Improper Authorization CWE-862: Missing Authorization •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 0

PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (memory corruption and polkitd daemon crash) and possibly gain privileges via unspecified vectors, related to "javascript rule evaluation." PolicyKit (también conocido como polkit) en versiones anteriores a 0.113 permite a usuarios locales provocar una denegación de servicio (corrupción de memoria y caída del demonio polkitd) y posiblemente obtener privilegios a través de vectores no especificados, relacionado con 'regla de evaluación javascript'. A denial of service flaw was found in how polkit handled authorization requests. A local, unprivileged user could send malicious requests to polkit, which could then cause the polkit daemon to corrupt its memory and crash. • http://lists.freedesktop.org/archives/polkit-devel/2015-July/000432.html http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00010.html http://lists.opensuse.org/opensuse-updates/2015-11/msg00042.html http://rhn.redhat.com/errata/RHSA-2016-0189.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html http://www.securityfocus.com/bid/77356 http://www.securitytracker.com/id/1035023 https://bugzilla.redhat.com/show_bug.cgi?id=1245684 https://access. • CWE-264: Permissions, Privileges, and Access Controls •