#VU42475 Permissions, Privileges, and Access Controls in Glibc and Fedora


Published: 2013-10-10 | Updated: 2020-08-10

Vulnerability identifier: #VU42475

Vulnerability risk: Low

CVSSv3.1: 3.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2013-2207

CWE-ID: CWE-264

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Glibc
Universal components / Libraries / Libraries used by multiple products
Fedora
Operating systems & Components / Operating system

Vendor: GNU
Fedoraproject

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Glibc: 2.0 - 2.16

Fedora: 2.0 - 19


External links
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://secunia.com/advisories/55113
http://www.mandriva.com/security/advisories?name=MDVSA-2013:283
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
http://bugzilla.redhat.com/show_bug.cgi?id=976408
http://security.gentoo.org/glsa/201503-04
http://sourceware.org/bugzilla/show_bug.cgi?id=15755
http://sourceware.org/ml/libc-alpha/2013-08/msg00160.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability