CVE Vulnerabilities

CVE-2013-4419

Published: Nov 05, 2013 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.8 MEDIUM
AV:A/AC:H/Au:N/C:C/I:C/A:C
RedHat/V2
6.8 MODERATE
AV:A/AC:H/Au:N/C:C/I:C/A:C
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the –remote or –listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.

Affected Software

NameVendorStart VersionEnd Version
LibguestfsLibguestfs1.20.0 (including)1.20.12 (including)
LibguestfsLibguestfs1.22.0 (including)1.22.7 (including)
Red Hat Enterprise Linux 6RedHatlibguestfs-1:1.20.11-2.el6*
LibguestfsUbuntuartful*
LibguestfsUbuntubionic*
LibguestfsUbuntucosmic*
LibguestfsUbuntudevel*
LibguestfsUbuntudisco*
LibguestfsUbuntueoan*
LibguestfsUbuntuesm-apps/bionic*
LibguestfsUbuntuesm-apps/focal*
LibguestfsUbuntuesm-apps/jammy*
LibguestfsUbuntuesm-apps/noble*
LibguestfsUbuntuesm-apps/xenial*
LibguestfsUbuntufocal*
LibguestfsUbuntugroovy*
LibguestfsUbuntuhirsute*
LibguestfsUbuntuimpish*
LibguestfsUbuntujammy*
LibguestfsUbuntukinetic*
LibguestfsUbuntulunar*
LibguestfsUbuntumantic*
LibguestfsUbuntunoble*
LibguestfsUbuntuoracular*
LibguestfsUbuntuplucky*
LibguestfsUbuntuprecise*
LibguestfsUbuntuquantal*
LibguestfsUbuntuquesting*
LibguestfsUbunturaring*
LibguestfsUbuntusaucy*
LibguestfsUbuntutrusty*
LibguestfsUbuntuupstream*
LibguestfsUbuntuutopic*
LibguestfsUbuntuvivid*
LibguestfsUbuntuwily*
LibguestfsUbuntuxenial*
LibguestfsUbuntuyakkety*
LibguestfsUbuntuzesty*

References