Executive Summary

Informations
Name CVE-2014-5033 First vendor Publication 2014-08-19
Vendor Cve Last vendor Modification 2014-10-16

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 6.9 Attack Range Local
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 3.4 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

KDE kdelibs before 4.14 and kauth before 5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, related to CVE-2013-4288 and "PID reuse race conditions."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5033

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-362 Race Condition

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:26005
 
Oval ID: oval:org.mitre.oval:def:26005
Title: DSA-3004-1 kde4libs - security update
Description: Sebastian Krahmer discovered that Kauth used Policykit insecurely by relying on the process ID. This could result in privilege escalation.
Family: unix Class: patch
Reference(s): DSA-3004-1
CVE-2014-5033
Version: 3
Platform(s): Debian GNU/Linux 7.0
Debian GNU/kFreeBSD 7.0
Product(s): kde4libs
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26261
 
Oval ID: oval:org.mitre.oval:def:26261
Title: USN-2304-1 -- kde4libs vulnerability
Description: kauth could be tricked into bypassing polkit authorizations.
Family: unix Class: patch
Reference(s): USN-2304-1
CVE-2014-5033
Version: 3
Platform(s): Ubuntu 14.04
Ubuntu 12.04
Product(s): kde4libs
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26921
 
Oval ID: oval:org.mitre.oval:def:26921
Title: RHSA-2014:1359: polkit-qt security update (Important)
Description: Polkit-qt is a library that lets developers use the PolicyKit API through a Qt-styled API. The polkit-qt library is used by the KDE Authentication Agent (KAuth), which is a part of kdelibs. It was found that polkit-qt handled authorization requests with PolicyKit via a D-Bus API that is vulnerable to a race condition. A local user could use this flaw to bypass intended PolicyKit authorizations. This update modifies polkit-qt to communicate with PolicyKit via a different API that is not vulnerable to the race condition. (CVE-2014-5033) All polkit-qt users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.
Family: unix Class: patch
Reference(s): RHSA-2014:1359-00
CESA-2014:1359
CVE-2014-5033
Version: 3
Platform(s): Red Hat Enterprise Linux 7
CentOS Linux 7
Product(s): polkit-qt
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26969
 
Oval ID: oval:org.mitre.oval:def:26969
Title: ELSA-2014-1359 -- polkit-qt security update
Description: [0.103.0-10] - Resolves: #1147368 (CVE-2014-5033)
Family: unix Class: patch
Reference(s): ELSA-2014-1359
CVE-2014-5033
Version: 4
Platform(s): Oracle Linux 7
Product(s): polkit-qt
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 2
Application 47
Os 2

Nessus® Vulnerability Scanner

Date Description
2015-03-26 Name : The remote Debian host is missing a security update.
File : debian_DLA-76.nasl - Type : ACT_GATHER_INFO
2014-10-11 Name : The remote Fedora host is missing a security update.
File : fedora_2014-11348.nasl - Type : ACT_GATHER_INFO
2014-10-07 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2014-1359.nasl - Type : ACT_GATHER_INFO
2014-10-07 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2014-1359.nasl - Type : ACT_GATHER_INFO
2014-10-07 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-1359.nasl - Type : ACT_GATHER_INFO
2014-09-29 Name : The remote Fedora host is missing one or more security updates.
File : fedora_2014-11448.nasl - Type : ACT_GATHER_INFO
2014-09-22 Name : The remote Fedora host is missing a security update.
File : fedora_2014-9602.nasl - Type : ACT_GATHER_INFO
2014-09-22 Name : The remote Fedora host is missing a security update.
File : fedora_2014-9641.nasl - Type : ACT_GATHER_INFO
2014-08-12 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3004.nasl - Type : ACT_GATHER_INFO
2014-08-12 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-485.nasl - Type : ACT_GATHER_INFO
2014-08-01 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_2f90556f18c611e49cc45453ed2e2b49.nasl - Type : ACT_GATHER_INFO
2014-08-01 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2304-1.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CONFIRM http://quickgit.kde.org/?p=kauth.git&a=commit&h=341b7d84b6d9c03cf5690...
http://quickgit.kde.org/?p=kdelibs.git&a=commitdiff&h=e4e7b53b71e2659...
http://www.kde.org/info/security/advisory-20140730-1.txt
DEBIAN http://www.debian.org/security/2014/dsa-3004
REDHAT http://rhn.redhat.com/errata/RHSA-2014-1359.html
SECUNIA http://secunia.com/advisories/60385
http://secunia.com/advisories/60633
http://secunia.com/advisories/60654
SUSE http://lists.opensuse.org/opensuse-updates/2014-08/msg00012.html
UBUNTU http://www.ubuntu.com/usn/USN-2304-1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
Date Informations
2020-05-24 01:14:13
  • Multiple Updates
2020-05-23 01:52:42
  • Multiple Updates
2020-05-23 00:41:43
  • Multiple Updates
2017-08-03 12:01:35
  • Multiple Updates
2016-06-29 00:38:01
  • Multiple Updates
2016-04-27 01:04:14
  • Multiple Updates
2015-03-27 13:28:27
  • Multiple Updates
2014-10-16 13:26:35
  • Multiple Updates
2014-10-12 13:27:26
  • Multiple Updates
2014-10-08 13:25:04
  • Multiple Updates
2014-09-30 13:27:32
  • Multiple Updates
2014-09-23 13:26:48
  • Multiple Updates
2014-08-20 21:25:15
  • Multiple Updates
2014-08-20 00:23:36
  • First insertion