CVE-2013-4392

systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357 Issue Tracking Third Party Advisory
http://www.openwall.com/lists/oss-security/2013/10/01/9 Mailing List Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=859060 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*

History

31 Jan 2022, 17:49

Type Values Removed Values Added
First Time Systemd Project
Systemd Project systemd
References (CONFIRM) http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357 - Third Party Advisory (CONFIRM) http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357 - Issue Tracking, Third Party Advisory
CPE cpe:2.3:a:freedesktop:systemd:*:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*

Information

Published : 2013-10-28 22:55

Updated : 2023-12-10 11:16


NVD link : CVE-2013-4392

Mitre link : CVE-2013-4392

CVE.ORG link : CVE-2013-4392


JSON object : View

Products Affected

systemd_project

  • systemd
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')