// For flags

CVE-2013-4311

libvirt: insecure calling of polkit

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

libvirt 1.0.5.x before 1.0.5.6, 0.10.2.x before 0.10.2.8, and 0.9.12.x before 0.9.12.2 allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition in pkcheck via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.

libvirt 1.0.5.x anterior a la versión 1.0.5.6, 0.10.2.x anterior a 0.10.2.8, y 0.9.12.x anterior a la versión 0.9.12.2 permite a usuarios locales evadir restricciones de acceso intencionadas mediante el aprovechamiento de una condición de carrera PolkitUnixProcess PolkitSubject en pkcheck a través de un (1) proceso setuid o (2) proceso pkexec, un problema relacionado con CVE-2013-4288.

The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. libvirt invokes the PolicyKit pkcheck utility to handle authorization. A race condition was found in the way libvirt used this utility, allowing a local user to bypass intended PolicyKit authorizations or execute arbitrary commands with root privileges. Note: With this update, libvirt has been rebuilt to communicate with PolicyKit via a different API that is not vulnerable to the race condition. The polkit RHSA-2013:1270 advisory must also be installed to fix the CVE-2013-4311 issue.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-06-12 CVE Reserved
  • 2013-09-18 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Redhat
Search vendor "Redhat"
Libvirt
Search vendor "Redhat" for product "Libvirt"
0.9.12
Search vendor "Redhat" for product "Libvirt" and version "0.9.12"
-
Affected
Redhat
Search vendor "Redhat"
Libvirt
Search vendor "Redhat" for product "Libvirt"
0.10.2
Search vendor "Redhat" for product "Libvirt" and version "0.10.2"
-
Affected
Redhat
Search vendor "Redhat"
Libvirt
Search vendor "Redhat" for product "Libvirt"
0.10.2.1
Search vendor "Redhat" for product "Libvirt" and version "0.10.2.1"
-
Affected
Redhat
Search vendor "Redhat"
Libvirt
Search vendor "Redhat" for product "Libvirt"
0.10.2.2
Search vendor "Redhat" for product "Libvirt" and version "0.10.2.2"
-
Affected
Redhat
Search vendor "Redhat"
Libvirt
Search vendor "Redhat" for product "Libvirt"
0.10.2.3
Search vendor "Redhat" for product "Libvirt" and version "0.10.2.3"
-
Affected
Redhat
Search vendor "Redhat"
Libvirt
Search vendor "Redhat" for product "Libvirt"
0.10.2.4
Search vendor "Redhat" for product "Libvirt" and version "0.10.2.4"
-
Affected
Redhat
Search vendor "Redhat"
Libvirt
Search vendor "Redhat" for product "Libvirt"
0.10.2.5
Search vendor "Redhat" for product "Libvirt" and version "0.10.2.5"
-
Affected
Redhat
Search vendor "Redhat"
Libvirt
Search vendor "Redhat" for product "Libvirt"
0.10.2.6
Search vendor "Redhat" for product "Libvirt" and version "0.10.2.6"
-
Affected
Redhat
Search vendor "Redhat"
Libvirt
Search vendor "Redhat" for product "Libvirt"
0.10.2.7
Search vendor "Redhat" for product "Libvirt" and version "0.10.2.7"
-
Affected
Redhat
Search vendor "Redhat"
Libvirt
Search vendor "Redhat" for product "Libvirt"
1.0.5
Search vendor "Redhat" for product "Libvirt" and version "1.0.5"
-
Affected
Redhat
Search vendor "Redhat"
Libvirt
Search vendor "Redhat" for product "Libvirt"
1.0.5.1
Search vendor "Redhat" for product "Libvirt" and version "1.0.5.1"
-
Affected
Redhat
Search vendor "Redhat"
Libvirt
Search vendor "Redhat" for product "Libvirt"
1.0.5.2
Search vendor "Redhat" for product "Libvirt" and version "1.0.5.2"
-
Affected
Redhat
Search vendor "Redhat"
Libvirt
Search vendor "Redhat" for product "Libvirt"
1.0.5.3
Search vendor "Redhat" for product "Libvirt" and version "1.0.5.3"
-
Affected
Redhat
Search vendor "Redhat"
Libvirt
Search vendor "Redhat" for product "Libvirt"
1.0.5.4
Search vendor "Redhat" for product "Libvirt" and version "1.0.5.4"
-
Affected
Redhat
Search vendor "Redhat"
Libvirt
Search vendor "Redhat" for product "Libvirt"
1.0.5.5
Search vendor "Redhat" for product "Libvirt" and version "1.0.5.5"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
10.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "10.04"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
12.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
12.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "12.10"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
13.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "13.04"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
6.0
Search vendor "Redhat" for product "Enterprise Linux" and version "6.0"
-
Affected