CVE-2013-4392

ADVISORY - debian

Summary

systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.


EPSS Score: 0.00067 (0.212)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Improper Link Resolution Before File Access ('Link Following')

ADVISORY - redhat

Time-of-check Time-of-use (TOCTOU) Race Condition


Debian

CREATED

UPDATED

ADVISORY IDCVE-2013-4392
EXPLOITABILITY SCORE

-

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

N/Alow
PackageTypeOS NameOS VersionAffected RangesFix Versions
debian/systemddebdebian12>=252.36-1~deb12u1Not yet available
debian/systemddebdebian11>=247.3-7+deb11u5Not yet available
debian/systemddebdebianunstable>=257.7-1Not yet available
debian/systemddebdebian13>=257.7-1Not yet available

Severity and metrics

No CVSS data available from this advisory.

NIST

CREATED

UPDATED

ADVISORY IDCVE-2013-4392
EXPLOITABILITY SCORE

1.3

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

5medium

Ubuntu

CREATED

UPDATED

ADVISORY IDCVE-2013-4392
EXPLOITABILITY SCORE

-

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

N/Alow

Red Hat

CREATED

UPDATED

ADVISORY IDCVE-2013-4392
EXPLOITABILITY SCORE

3.4

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

3.3medium