Vulnerability Details CVE-2013-4324
spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 20.5%
CVSS Severity
CVSS v2 Score 4.6
Products affected by CVE-2013-4324
-
cpe:2.3:a:spice-gtk_project:spice-gtk:0.14
-
cpe:2.3:o:redhat:enterprise_linux:6.0