Executive Summary

Informations
Name CVE-2013-4362 First vendor Publication 2013-09-30
Vendor Cve Last vendor Modification 2017-07-01

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

WEB-DAV Linux File System (davfs2) 1.4.6 and 1.4.7 allow local users to gain privileges via unknown attack vectors in (1) kernel_interface.c and (2) mount_davfs.c, related to the "system" function.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4362

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:19717
 
Oval ID: oval:org.mitre.oval:def:19717
Title: DSA-2765-1 davfs2 - privilege escalation
Description: Davfs2, a filesystem client for WebDAV, calls the function system() insecurely while is setuid root. This might allow a privilege escalation.
Family: unix Class: patch
Reference(s): DSA-2765-1
CVE-2013-4362
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/Linux 7
Debian GNU/kFreeBSD 6.0
Debian GNU/kFreeBSD 7
Product(s): davfs2
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28673
 
Oval ID: oval:org.mitre.oval:def:28673
Title: DSA-2765-2 -- davfs2 -- privilege escalation
Description: Davfs2, a filesystem client for WebDAV, calls the function systeminsecurely while is setuid root. This might allow a privilege escalation.
Family: unix Class: patch
Reference(s): DSA-2765-2
CVE-2013-4362
Version: 3
Platform(s): Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Debian GNU/Linux 7.0
Debian GNU/kFreeBSD 7.0
Product(s): davfs2
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2

Nessus® Vulnerability Scanner

Date Description
2016-12-05 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201612-02.nasl - Type : ACT_GATHER_INFO
2013-12-20 Name : The remote Fedora host is missing a security update.
File : fedora_2013-17836.nasl - Type : ACT_GATHER_INFO
2013-12-20 Name : The remote Fedora host is missing a security update.
File : fedora_2013-17853.nasl - Type : ACT_GATHER_INFO
2013-11-11 Name : The remote Fedora host is missing a security update.
File : fedora_2013-17828.nasl - Type : ACT_GATHER_INFO
2013-10-01 Name : The remote Mandriva Linux host is missing a security update.
File : mandriva_MDVSA-2013-244.nasl - Type : ACT_GATHER_INFO
2013-09-27 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2765.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/62445
CONFIRM http://savannah.nongnu.org/bugs/?40034
DEBIAN http://www.debian.org/security/2013/dsa-2765
GENTOO https://security.gentoo.org/glsa/201612-02
MLIST http://seclists.org/oss-sec/2013/q3/627
OSVDB http://osvdb.org/97416
http://osvdb.org/97417

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
Date Informations
2021-05-04 12:27:17
  • Multiple Updates
2021-04-22 01:33:03
  • Multiple Updates
2020-05-23 00:38:00
  • Multiple Updates
2017-07-01 09:23:10
  • Multiple Updates
2016-12-06 13:26:15
  • Multiple Updates
2016-06-28 19:39:35
  • Multiple Updates
2016-04-04 17:23:40
  • Multiple Updates
2015-05-12 09:27:15
  • Multiple Updates
2014-02-17 11:22:04
  • Multiple Updates
2013-10-11 00:20:01
  • Multiple Updates
2013-10-02 00:21:02
  • Multiple Updates
2013-10-01 17:19:57
  • First insertion