Executive Summary
Summary | |
---|---|
Title | systemd security update |
Informations | |||
---|---|---|---|
Name | DSA-2777 | First vendor Publication | 2013-10-11 |
Vendor | Debian | Last vendor Modification | 2013-10-11 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple security issues in systemd have been discovered by Sebastian Krahmer and Florian Weimer: Insecure interaction with DBUS could lead to the bypass of Policykit restrictions and privilege escalation or denial of service through an integer overflow in journald and missing input sanitising in the processing of X keyboard extension (XKB) files. For the stable distribution (wheezy), these problems have been fixed in version 44-11+deb7u4. For the unstable distribution (sid), these problems will be fixed soon. We recommend that you upgrade your systemd packages. |
Original Source
Url : http://www.debian.org/security/2013/dsa-2777 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
33 % | CWE-362 | Race Condition |
33 % | CWE-276 | Incorrect Default Permissions |
33 % | CWE-190 | Integer Overflow or Wraparound (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18931 | |||
Oval ID: | oval:org.mitre.oval:def:18931 | ||
Title: | USN-1961-1 -- systemd vulnerability | ||
Description: | systemd could be tricked into bypassing polkit authorizations. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1961-1 CVE-2013-4327 | Version: | 5 |
Platform(s): | Ubuntu 13.04 | Product(s): | systemd |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19967 | |||
Oval ID: | oval:org.mitre.oval:def:19967 | ||
Title: | DSA-2777-1 systemd - several | ||
Description: | Multiple security issues in systemd have been discovered by Sebastian Krahmer and Florian Weimer: Insecure interaction with DBUS could lead to the bypass of Policykit restrictions and privilege escalation or denial of service through an integer overflow in journald and missing input sanitising in the processing of X keyboard extension (XKB) files. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2777-1 CVE-2013-4327 CVE-2013-4391 CVE-2013-4394 | Version: | 5 |
Platform(s): | Debian GNU/Linux 7 Debian GNU/kFreeBSD 7 | Product(s): | systemd |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-12-13 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201612-34.nasl - Type : ACT_GATHER_INFO |
2014-06-27 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201406-27.nasl - Type : ACT_GATHER_INFO |
2013-10-13 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2777.nasl - Type : ACT_GATHER_INFO |
2013-09-28 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-243.nasl - Type : ACT_GATHER_INFO |
2013-09-23 | Name : The remote Fedora host is missing a security update. File : fedora_2013-17176.nasl - Type : ACT_GATHER_INFO |
2013-09-23 | Name : The remote Fedora host is missing a security update. File : fedora_2013-17203.nasl - Type : ACT_GATHER_INFO |
2013-09-22 | Name : The remote Fedora host is missing a security update. File : fedora_2013-17119.nasl - Type : ACT_GATHER_INFO |
2013-09-19 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1961-1.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:32:14 |
|
2013-10-29 21:22:57 |
|
2013-10-29 13:21:54 |
|
2013-10-11 17:18:49 |
|