The SetX11Keyboard function in systemd, when PolicyKit Local Authority (PKLA) is used to change the group permissions on the X Keyboard Extension (XKB) layouts description, allows local users in the group to modify the Xorg X11 Server configuration file and possibly gain privileges via vectors involving "special and control characters."
References
Link | Resource |
---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357 | Issue Tracking Third Party Advisory |
http://www.debian.org/security/2013/dsa-2777 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2013/10/01/9 | Mailing List Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=862324 | Issue Tracking Patch Third Party Advisory |
https://security.gentoo.org/glsa/201612-34 | Third Party Advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357 | Issue Tracking Third Party Advisory |
http://www.debian.org/security/2013/dsa-2777 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2013/10/01/9 | Mailing List Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=862324 | Issue Tracking Patch Third Party Advisory |
https://security.gentoo.org/glsa/201612-34 | Third Party Advisory |
Configurations
History
21 Nov 2024, 01:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357 - Issue Tracking, Third Party Advisory | |
References | () http://www.debian.org/security/2013/dsa-2777 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2013/10/01/9 - Mailing List, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=862324 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201612-34 - Third Party Advisory |
31 Jan 2022, 17:50
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:* |
Information
Published : 2013-10-28 22:55
Updated : 2024-11-21 01:55
NVD link : CVE-2013-4394
Mitre link : CVE-2013-4394
CVE.ORG link : CVE-2013-4394
JSON object : View
Products Affected
systemd_project
- systemd
debian
- debian_linux
CWE
CWE-276
Incorrect Default Permissions