CVE-2013-6409
Published Dec 7, 2013
Last updated 11 years ago
Overview
- Description
- Debian adequate before 0.8.1, when run by root with the --user option, allows local users to hijack the tty and possibly gain privileges via the TIOCSTI ioctl.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.2
- Impact score
- 10
- Exploitability score
- 1.9
- Vector string
- AV:L/AC:H/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:debian:adequate:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1548F939-FE38-435D-9C6D-20471C373555", "versionEndIncluding": "0.8" }, { "criteria": "cpe:2.3:a:debian:adequate:0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79B73732-BD60-44C2-A0E0-DE24D5969010" }, { "criteria": "cpe:2.3:a:debian:adequate:0.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19DB775F-74D9-4642-B2DD-37C0846BE6D1" }, { "criteria": "cpe:2.3:a:debian:adequate:0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E69347AE-53EF-4473-AB78-F16DE8752C33" }, { "criteria": "cpe:2.3:a:debian:adequate:0.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E56707A4-91F3-4B0F-B9D2-43FB37A1A478" }, { "criteria": "cpe:2.3:a:debian:adequate:0.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "335D6F8B-9AD4-40C2-AD4E-A8C38192447C" }, { "criteria": "cpe:2.3:a:debian:adequate:0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA4BA32B-135A-4A45-B10C-8F01B5FFE4CB" }, { "criteria": "cpe:2.3:a:debian:adequate:0.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E08C19A1-A084-46A1-9A6E-B067C83C5ACF" }, { "criteria": "cpe:2.3:a:debian:adequate:0.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0ADB71BA-A5D3-43D2-8A4F-3CE0D9D7707D" }, { "criteria": "cpe:2.3:a:debian:adequate:0.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C163D58F-A68E-49EF-B6CD-39CCDB774151" }, { "criteria": "cpe:2.3:a:debian:adequate:0.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3AE0D40-460E-4C9F-BF57-60DC7ABF1FF4" }, { "criteria": "cpe:2.3:a:debian:adequate:0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "039E2AFE-7A61-4D8E-8404-414D002F6FCA" }, { "criteria": "cpe:2.3:a:debian:adequate:0.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B8C7825-EF20-4652-8015-6EEFEF6997C7" }, { "criteria": "cpe:2.3:a:debian:adequate:0.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F80D1419-8E76-4D7A-A104-6465ADF8606C" }, { "criteria": "cpe:2.3:a:debian:adequate:0.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A6E6D72-EDCC-4617-B94E-23D7C78D4C5D" }, { "criteria": "cpe:2.3:a:debian:adequate:0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3DD4343-E9F5-4C9D-BF9B-27399B74D9A9" }, { "criteria": "cpe:2.3:a:debian:adequate:0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C502669-D2BA-4D2F-87B4-D1E2651C3062" }, { "criteria": "cpe:2.3:a:debian:adequate:0.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A5FC65F-5FCE-4E8B-82F4-79DBD5715C2C" } ], "operator": "OR" } ] } ]