#VU42475 Permissions, Privileges, and Access Controls in Glibc and Fedora - CVE-2013-2207


| Updated: 2020-08-10

Vulnerability identifier: #VU42475

Vulnerability risk: Low

CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2013-2207

CWE-ID: CWE-264

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Glibc
Universal components / Libraries / Libraries used by multiple products
Fedora
Operating systems & Components / Operating system

Vendor: GNU
Fedoraproject

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Glibc: 2.0 - 2.16

Fedora: 2.0 - 19


External links
https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html
https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
https://secunia.com/advisories/55113
https://www.mandriva.com/security/advisories?name=MDVSA-2013:283
https://www.ubuntu.com/usn/USN-2985-1
https://www.ubuntu.com/usn/USN-2985-2
https://bugzilla.redhat.com/show_bug.cgi?id=976408
https://security.gentoo.org/glsa/201503-04
https://sourceware.org/bugzilla/show_bug.cgi?id=15755
https://sourceware.org/ml/libc-alpha/2013-08/msg00160.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability