Search criteria
3 vulnerabilities found for kde4libs by debian
FKIE_CVE-2014-5033
Vulnerability from fkie_nvd - Published: 2014-08-19 18:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
KDE kdelibs before 4.14 and kauth before 5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, related to CVE-2013-4288 and "PID reuse race conditions."
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| debian | kde4libs | - | |
| canonical | ubuntu_linux | 12.04 | |
| canonical | ubuntu_linux | 14.04 | |
| kde | kauth | * | |
| kde | kdelibs | * | |
| kde | kdelibs | 4.10.0 | |
| kde | kdelibs | 4.10.1 | |
| kde | kdelibs | 4.10.2 | |
| kde | kdelibs | 4.10.3 | |
| kde | kdelibs | 4.10.95 | |
| kde | kdelibs | 4.10.97 | |
| kde | kdelibs | 4.11.0 | |
| kde | kdelibs | 4.11.1 | |
| kde | kdelibs | 4.11.2 | |
| kde | kdelibs | 4.11.3 | |
| kde | kdelibs | 4.11.4 | |
| kde | kdelibs | 4.11.5 | |
| kde | kdelibs | 4.11.80 | |
| kde | kdelibs | 4.11.90 | |
| kde | kdelibs | 4.11.95 | |
| kde | kdelibs | 4.11.97 | |
| kde | kdelibs | 4.12.0 | |
| kde | kdelibs | 4.12.1 | |
| kde | kdelibs | 4.12.2 | |
| kde | kdelibs | 4.12.3 | |
| kde | kdelibs | 4.12.4 | |
| kde | kdelibs | 4.12.5 | |
| kde | kdelibs | 4.12.80 | |
| kde | kdelibs | 4.12.90 | |
| kde | kdelibs | 4.12.95 | |
| kde | kdelibs | 4.12.97 | |
| kde | kdelibs | 4.13.0 | |
| kde | kdelibs | 4.13.1 | |
| kde | kdelibs | 4.13.2 | |
| kde | kdelibs | 4.13.3 | |
| kde | kdelibs | 4.13.80 | |
| kde | kdelibs | 4.13.90 | |
| kde | kdelibs | 4.13.95 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:debian:kde4libs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F69F6CA3-205F-4A3B-B1EE-87A93D87CE81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
"matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kde:kauth:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8DE7A5C-2C0F-4DD1-90E2-26891DC79575",
"versionEndIncluding": "5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DED2728D-6EC3-4641-9972-F43AB4D1BB72",
"versionEndIncluding": "4.13.97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A1BF2C7-0945-4325-9514-F2F37E8CE43B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B2C7808F-2203-43DF-808C-7A0B85367293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "61937C14-55DF-4E30-947D-21EC3F418E62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD7ECC09-0985-44AA-909E-86981CC13A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.10.95:*:*:*:*:*:*:*",
"matchCriteriaId": "3A7D10AF-E305-41F4-9154-7071E684C6B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.10.97:*:*:*:*:*:*:*",
"matchCriteriaId": "B34C3204-4A63-4490-ABED-AF83CE3F37E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "39EAE85E-BF52-45EA-82D8-BBBC0DE9759C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B4D1998-D62F-4D0E-8E6C-33D4760BE69D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "13CD2D8F-32F6-4AC4-B43C-506724EA6E38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4733C600-C5D6-4A5D-A1DF-1F41597F6926",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BC7EBD3A-EDFC-4B8F-9095-5E0670AF991E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.11.5:*:*:*:*:*:*:*",
"matchCriteriaId": "55EC512F-3F86-40DA-AA7B-034DA9B5DBA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.11.80:*:*:*:*:*:*:*",
"matchCriteriaId": "08FF236F-A7D5-4D08-8885-BD1889B0D398",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.11.90:*:*:*:*:*:*:*",
"matchCriteriaId": "5F5EDED4-34A3-4D2B-A9E7-D980D78E10EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.11.95:*:*:*:*:*:*:*",
"matchCriteriaId": "46457BB9-BD24-4437-AFDA-01D25E52410E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.11.97:*:*:*:*:*:*:*",
"matchCriteriaId": "52A2D11C-26D2-47F1-9D34-60DB3116C39E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A58204C3-0DEC-462B-A6B8-5EC1D9B65729",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C767A89D-BA45-4730-BA2D-AAC2BA7436E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9A5FC4CC-DC0C-44D8-AAF6-A15CF7E6BD5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "24629660-4066-4362-AD77-080604488303",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "718095EE-ADEC-4E28-B678-DA3D636BBE32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EA3E3729-298F-43C3-9BE0-82072FE47F9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.12.80:*:*:*:*:*:*:*",
"matchCriteriaId": "B6FC3277-8410-437F-813A-63254E983A5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.12.90:*:*:*:*:*:*:*",
"matchCriteriaId": "88E2B874-46DF-4A95-9541-14CF70E2A73D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.12.95:*:*:*:*:*:*:*",
"matchCriteriaId": "1A593BA6-D3B2-48EE-AC9E-B84967D03B37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.12.97:*:*:*:*:*:*:*",
"matchCriteriaId": "14034B30-9DE0-43EE-A79D-D4FC624D6C86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2A34BC1E-102D-43EF-A7BD-46E9866B07ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "90E66075-D997-4C6D-94AA-DE224B12BB2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.13.2:*:*:*:*:*:*:*",
"matchCriteriaId": "33DCF182-2AD8-4267-B425-1B0A7D2BC0EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.13.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F572E904-3EE4-4B01-AA7B-EF5F7F643E37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.13.80:*:*:*:*:*:*:*",
"matchCriteriaId": "033ED945-4E0E-41AA-8B02-3BDCC0F27159",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.13.90:*:*:*:*:*:*:*",
"matchCriteriaId": "C46B58D8-67F7-4920-8512-CB07C7446976",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kde:kdelibs:4.13.95:*:*:*:*:*:*:*",
"matchCriteriaId": "E58C522E-8824-49B7-AAA9-6545E6DD5551",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "KDE kdelibs before 4.14 and kauth before 5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, related to CVE-2013-4288 and \"PID reuse race conditions.\""
},
{
"lang": "es",
"value": "KDE kdelibs anterior a 4.14 y kauth anterior a 5.1 no utilizan debidamente D-Bus para la comunicaci\u00f3n con una autoridad polkit, lo que permite a usuarios locales evadir las restricciones de acceso mediante el aprovechamiento de una condici\u00f3n de carrera PolkitUnixProcess PolkitSubject a trav\u00e9s de un proceso (1) setuid o (2) pkexec, relacionado con el CVE-2013-4288 y \u0027condiciones de carrera de reuso PID.\u0027"
}
],
"id": "CVE-2014-5033",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-08-19T18:55:03.233",
"references": [
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00012.html"
},
{
"source": "cve@mitre.org",
"url": "http://quickgit.kde.org/?p=kauth.git\u0026a=commit\u0026h=341b7d84b6d9c03cf56905cb277b47e11c81482a"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
],
"url": "http://quickgit.kde.org/?p=kdelibs.git\u0026a=commitdiff\u0026h=e4e7b53b71e2659adaf52691d4accc3594203b23"
},
{
"source": "cve@mitre.org",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1359.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/60385"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/60633"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/60654"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2014/dsa-3004"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.kde.org/info/security/advisory-20140730-1.txt"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/USN-2304-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00012.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://quickgit.kde.org/?p=kauth.git\u0026a=commit\u0026h=341b7d84b6d9c03cf56905cb277b47e11c81482a"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
],
"url": "http://quickgit.kde.org/?p=kdelibs.git\u0026a=commitdiff\u0026h=e4e7b53b71e2659adaf52691d4accc3594203b23"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1359.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/60385"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/60633"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/60654"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2014/dsa-3004"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.kde.org/info/security/advisory-20140730-1.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-2304-1"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2014-5033 (GCVE-0-2014-5033)
Vulnerability from cvelistv5 – Published: 2014-08-19 18:00 – Updated: 2024-08-06 11:34
VLAI?
Summary
KDE kdelibs before 4.14 and kauth before 5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, related to CVE-2013-4288 and "PID reuse race conditions."
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T11:34:37.288Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "60385",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/60385"
},
{
"name": "RHSA-2014:1359",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1359.html"
},
{
"name": "DSA-3004",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2014/dsa-3004"
},
{
"name": "USN-2304-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2304-1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://quickgit.kde.org/?p=kauth.git\u0026a=commit\u0026h=341b7d84b6d9c03cf56905cb277b47e11c81482a"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kde.org/info/security/advisory-20140730-1.txt"
},
{
"name": "60654",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/60654"
},
{
"name": "openSUSE-SU-2014:0981",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00012.html"
},
{
"name": "60633",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/60633"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://quickgit.kde.org/?p=kdelibs.git\u0026a=commitdiff\u0026h=e4e7b53b71e2659adaf52691d4accc3594203b23"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-07-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "KDE kdelibs before 4.14 and kauth before 5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, related to CVE-2013-4288 and \"PID reuse race conditions.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-10-14T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "60385",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/60385"
},
{
"name": "RHSA-2014:1359",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1359.html"
},
{
"name": "DSA-3004",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2014/dsa-3004"
},
{
"name": "USN-2304-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2304-1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://quickgit.kde.org/?p=kauth.git\u0026a=commit\u0026h=341b7d84b6d9c03cf56905cb277b47e11c81482a"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kde.org/info/security/advisory-20140730-1.txt"
},
{
"name": "60654",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/60654"
},
{
"name": "openSUSE-SU-2014:0981",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00012.html"
},
{
"name": "60633",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/60633"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://quickgit.kde.org/?p=kdelibs.git\u0026a=commitdiff\u0026h=e4e7b53b71e2659adaf52691d4accc3594203b23"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-5033",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "KDE kdelibs before 4.14 and kauth before 5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, related to CVE-2013-4288 and \"PID reuse race conditions.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "60385",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60385"
},
{
"name": "RHSA-2014:1359",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1359.html"
},
{
"name": "DSA-3004",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-3004"
},
{
"name": "USN-2304-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2304-1"
},
{
"name": "http://quickgit.kde.org/?p=kauth.git\u0026a=commit\u0026h=341b7d84b6d9c03cf56905cb277b47e11c81482a",
"refsource": "CONFIRM",
"url": "http://quickgit.kde.org/?p=kauth.git\u0026a=commit\u0026h=341b7d84b6d9c03cf56905cb277b47e11c81482a"
},
{
"name": "http://www.kde.org/info/security/advisory-20140730-1.txt",
"refsource": "CONFIRM",
"url": "http://www.kde.org/info/security/advisory-20140730-1.txt"
},
{
"name": "60654",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60654"
},
{
"name": "openSUSE-SU-2014:0981",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00012.html"
},
{
"name": "60633",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60633"
},
{
"name": "http://quickgit.kde.org/?p=kdelibs.git\u0026a=commitdiff\u0026h=e4e7b53b71e2659adaf52691d4accc3594203b23",
"refsource": "CONFIRM",
"url": "http://quickgit.kde.org/?p=kdelibs.git\u0026a=commitdiff\u0026h=e4e7b53b71e2659adaf52691d4accc3594203b23"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-5033",
"datePublished": "2014-08-19T18:00:00",
"dateReserved": "2014-07-22T00:00:00",
"dateUpdated": "2024-08-06T11:34:37.288Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-5033 (GCVE-0-2014-5033)
Vulnerability from nvd – Published: 2014-08-19 18:00 – Updated: 2024-08-06 11:34
VLAI?
Summary
KDE kdelibs before 4.14 and kauth before 5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, related to CVE-2013-4288 and "PID reuse race conditions."
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T11:34:37.288Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "60385",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/60385"
},
{
"name": "RHSA-2014:1359",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1359.html"
},
{
"name": "DSA-3004",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2014/dsa-3004"
},
{
"name": "USN-2304-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2304-1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://quickgit.kde.org/?p=kauth.git\u0026a=commit\u0026h=341b7d84b6d9c03cf56905cb277b47e11c81482a"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kde.org/info/security/advisory-20140730-1.txt"
},
{
"name": "60654",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/60654"
},
{
"name": "openSUSE-SU-2014:0981",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00012.html"
},
{
"name": "60633",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/60633"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://quickgit.kde.org/?p=kdelibs.git\u0026a=commitdiff\u0026h=e4e7b53b71e2659adaf52691d4accc3594203b23"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-07-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "KDE kdelibs before 4.14 and kauth before 5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, related to CVE-2013-4288 and \"PID reuse race conditions.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-10-14T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "60385",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/60385"
},
{
"name": "RHSA-2014:1359",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1359.html"
},
{
"name": "DSA-3004",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2014/dsa-3004"
},
{
"name": "USN-2304-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2304-1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://quickgit.kde.org/?p=kauth.git\u0026a=commit\u0026h=341b7d84b6d9c03cf56905cb277b47e11c81482a"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kde.org/info/security/advisory-20140730-1.txt"
},
{
"name": "60654",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/60654"
},
{
"name": "openSUSE-SU-2014:0981",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00012.html"
},
{
"name": "60633",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/60633"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://quickgit.kde.org/?p=kdelibs.git\u0026a=commitdiff\u0026h=e4e7b53b71e2659adaf52691d4accc3594203b23"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-5033",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "KDE kdelibs before 4.14 and kauth before 5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, related to CVE-2013-4288 and \"PID reuse race conditions.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "60385",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60385"
},
{
"name": "RHSA-2014:1359",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1359.html"
},
{
"name": "DSA-3004",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-3004"
},
{
"name": "USN-2304-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2304-1"
},
{
"name": "http://quickgit.kde.org/?p=kauth.git\u0026a=commit\u0026h=341b7d84b6d9c03cf56905cb277b47e11c81482a",
"refsource": "CONFIRM",
"url": "http://quickgit.kde.org/?p=kauth.git\u0026a=commit\u0026h=341b7d84b6d9c03cf56905cb277b47e11c81482a"
},
{
"name": "http://www.kde.org/info/security/advisory-20140730-1.txt",
"refsource": "CONFIRM",
"url": "http://www.kde.org/info/security/advisory-20140730-1.txt"
},
{
"name": "60654",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60654"
},
{
"name": "openSUSE-SU-2014:0981",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00012.html"
},
{
"name": "60633",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60633"
},
{
"name": "http://quickgit.kde.org/?p=kdelibs.git\u0026a=commitdiff\u0026h=e4e7b53b71e2659adaf52691d4accc3594203b23",
"refsource": "CONFIRM",
"url": "http://quickgit.kde.org/?p=kdelibs.git\u0026a=commitdiff\u0026h=e4e7b53b71e2659adaf52691d4accc3594203b23"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-5033",
"datePublished": "2014-08-19T18:00:00",
"dateReserved": "2014-07-22T00:00:00",
"dateUpdated": "2024-08-06T11:34:37.288Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}