Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2011-4945 |
CWE-ID | CWE-264 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
PolicyKit Client/Desktop applications / Other client software |
Vendor | Freedesktop.org |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU43447
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2011-4945
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
PolicyKit 0.103 sets the AdminIdentities to "wheel" by default, which allows local users in the wheel group to gain root privileges without authentication.
MitigationInstall update from vendor's website.
Vulnerable software versionsPolicyKit: 0.103
CPE2.3 External linkshttp://cgit.freedesktop.org/PolicyKit/commit/?id=763faf434b445c20ae9529100d3ef5290976d0c9
http://patch-tracker.debian.org/patch/series/view/policykit-1/0.104-2/05_revert-admin-identities-unix-group-wheel.patch
http://secunia.com/advisories/48817
http://security.gentoo.org/glsa/glsa-201204-06.xml
http://www.mail-archive.com/polkit-devel@lists.freedesktop.org/msg00327.html
http://www.openwall.com/lists/oss-security/2012/03/28/1
http://www.openwall.com/lists/oss-security/2012/03/28/2
http://bugs.gentoo.org/show_bug.cgi?id=401513
http://launchpad.net/ubuntu/+source/policykit-1/0.103-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.