Vulnerability Details : CVE-2013-1958
The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.8.6 does not properly enforce capability requirements for controlling the PID value associated with a UNIX domain socket, which allows local users to bypass intended access restrictions by leveraging the time interval during which a user namespace has been created but a PID namespace has not been created.
Products affected by CVE-2013-1958
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-1958
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-1958
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
1.9
|
LOW | AV:L/AC:M/Au:N/C:N/I:P/A:N |
3.4
|
2.9
|
NIST |
CWE ids for CVE-2013-1958
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-1958
-
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6
-
http://www.openwall.com/lists/oss-security/2013/04/16/11
oss-security - Re: Re: Summary of security bugs (now fixed) in user namespaces
-
https://github.com/torvalds/linux/commit/92f28d973cce45ef5823209aab3138eb45d8b349
scm: Require CAP_SYS_ADMIN over the current pidns to spoof pids. · torvalds/linux@92f28d9 · GitHub
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=92f28d973cce45ef5823209aab3138eb45d8b349
Jump to