ID:4385 - Exploit for Permissions, Privileges, and Access Controls in Linux kernel - CVE-2013-1959

 
Main Vulnerability Database Exploits ID:4385 - Exploit for Permissions, Privileges, and Access Controls in Linux kernel - CVE-2013-1959

ID:4385 - Exploit for Permissions, Privileges, and Access Controls in Linux kernel - CVE-2013-1959

Published: August 11, 2020


Vulnerability identifier: #VU42849
Vulnerability risk: Medium
CVE-ID: CVE-2013-1959
CWE-ID: CWE-264
Exploitation vector: Remote access
Vulnerable software:
Linux kernel

Link to public exploit:


Vulnerability description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

kernel/user_namespace.c in the Linux kernel before 3.8.9 does not have appropriate capability requirements for the uid_map and gid_map files, which allows local users to gain privileges by opening a file within an unprivileged process and then modifying the file within a privileged process.


Remediation

Install update from vendor's website.