CVE-2013-4419

EUVD-2013-4296
The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.8 UNKNOWN
ADJACENT_NETWORK
HIGH
AV:A/AC:H/Au:N/C:C/I:C/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 24%
Affected Products (NVD)
VendorProductVersion
libguestfslibguestfs
1.20.0 ≤
𝑥
≤ 1.20.12
libguestfslibguestfs
1.22.0 ≤
𝑥
≤ 1.22.7
susesuse_linux_enterprise_software_development_kit
11.0:sp3
novellsuse_linux_enterprise_server
11.0:sp3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libguestfs
bookworm
1:1.48.6-2
fixed
bullseye
1:1.44.0-2
fixed
sid
1:1.52.2-5
fixed
trixie
1:1.52.2-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libguestfs
artful
ignored
bionic
needed
cosmic
ignored
disco
ignored
eoan
ignored
focal
needed
groovy
ignored
hirsute
ignored
impish
ignored
jammy
needed
kinetic
ignored
lucid
dne
lunar
ignored
mantic
ignored
noble
needed
precise
ignored
quantal
ignored
raring
ignored
saucy
ignored
trusty
dne
utopic
ignored
vivid
ignored
wily
ignored
xenial
needed
yakkety
ignored
zesty
ignored
Common Weakness Enumeration