CVE-2013-4419

The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
ADJACENT_NETWORK
HIGH
AV:A/AC:H/Au:N/C:C/I:C/A:C
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 23%
VendorProductVersion
libguestfslibguestfs
1.20.0 ≤
𝑥
≤ 1.20.12
libguestfslibguestfs
1.22.0 ≤
𝑥
≤ 1.22.7
susesuse_linux_enterprise_software_development_kit
11.0:sp3
novellsuse_linux_enterprise_server
11.0:sp3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libguestfs
bullseye
1:1.44.0-2
fixed
bookworm
1:1.48.6-2
fixed
sid
1:1.52.2-5
fixed
trixie
1:1.52.2-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libguestfs
noble
needed
mantic
ignored
lunar
ignored
kinetic
ignored
jammy
needed
impish
ignored
hirsute
ignored
groovy
ignored
focal
needed
eoan
ignored
disco
ignored
cosmic
ignored
bionic
needed
artful
ignored
zesty
ignored
yakkety
ignored
xenial
needed
wily
ignored
vivid
ignored
utopic
ignored
trusty
dne
saucy
ignored
raring
ignored
quantal
ignored
precise
ignored
lucid
dne
Common Weakness Enumeration