Show plain JSON{"id": "CVE-2013-6409", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.2, "accessVector": "LOCAL", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "HIGH", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 1.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2013-12-07T20:55:02.727", "references": [{"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730691", "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/bid/63994", "source": "secalert@redhat.com"}, {"url": "https://bitbucket.org/jwilk/adequate/raw/tip/debian/changelog", "source": "secalert@redhat.com"}, {"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730691", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/63994", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bitbucket.org/jwilk/adequate/raw/tip/debian/changelog", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-264"}]}], "descriptions": [{"lang": "en", "value": "Debian adequate before 0.8.1, when run by root with the --user option, allows local users to hijack the tty and possibly gain privileges via the TIOCSTI ioctl."}, {"lang": "es", "value": "Debian adequate anterior a la versi\u00f3n 0.8.1, cuando se ejecuta mediante root con la opci\u00f3n --user, permite a usuarios locales secuestrar el tty y posiblemente obtener privilegios a trav\u00e9s de TIOCSTI ioctl."}], "lastModified": "2024-11-21T01:59:10.003", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:debian:adequate:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1548F939-FE38-435D-9C6D-20471C373555", "versionEndIncluding": "0.8"}, {"criteria": "cpe:2.3:a:debian:adequate:0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79B73732-BD60-44C2-A0E0-DE24D5969010"}, {"criteria": "cpe:2.3:a:debian:adequate:0.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19DB775F-74D9-4642-B2DD-37C0846BE6D1"}, {"criteria": "cpe:2.3:a:debian:adequate:0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E69347AE-53EF-4473-AB78-F16DE8752C33"}, {"criteria": "cpe:2.3:a:debian:adequate:0.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E56707A4-91F3-4B0F-B9D2-43FB37A1A478"}, {"criteria": "cpe:2.3:a:debian:adequate:0.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "335D6F8B-9AD4-40C2-AD4E-A8C38192447C"}, {"criteria": "cpe:2.3:a:debian:adequate:0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA4BA32B-135A-4A45-B10C-8F01B5FFE4CB"}, {"criteria": "cpe:2.3:a:debian:adequate:0.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E08C19A1-A084-46A1-9A6E-B067C83C5ACF"}, {"criteria": "cpe:2.3:a:debian:adequate:0.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0ADB71BA-A5D3-43D2-8A4F-3CE0D9D7707D"}, {"criteria": "cpe:2.3:a:debian:adequate:0.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C163D58F-A68E-49EF-B6CD-39CCDB774151"}, {"criteria": "cpe:2.3:a:debian:adequate:0.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3AE0D40-460E-4C9F-BF57-60DC7ABF1FF4"}, {"criteria": "cpe:2.3:a:debian:adequate:0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "039E2AFE-7A61-4D8E-8404-414D002F6FCA"}, {"criteria": "cpe:2.3:a:debian:adequate:0.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B8C7825-EF20-4652-8015-6EEFEF6997C7"}, {"criteria": "cpe:2.3:a:debian:adequate:0.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F80D1419-8E76-4D7A-A104-6465ADF8606C"}, {"criteria": "cpe:2.3:a:debian:adequate:0.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A6E6D72-EDCC-4617-B94E-23D7C78D4C5D"}, {"criteria": "cpe:2.3:a:debian:adequate:0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3DD4343-E9F5-4C9D-BF9B-27399B74D9A9"}, {"criteria": "cpe:2.3:a:debian:adequate:0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C502669-D2BA-4D2F-87B4-D1E2651C3062"}, {"criteria": "cpe:2.3:a:debian:adequate:0.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A5FC65F-5FCE-4E8B-82F4-79DBD5715C2C"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}