Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:debian:kde4libs:-:*:*:*:*:*:*:*", "matchCriteriaId": "F69F6CA3-205F-4A3B-B1EE-87A93D87CE81", "vulnerable": true}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:kde:kauth:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8DE7A5C-2C0F-4DD1-90E2-26891DC79575", "versionEndIncluding": "5.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:*:*:*:*:*:*:*:*", "matchCriteriaId": "DED2728D-6EC3-4641-9972-F43AB4D1BB72", "versionEndIncluding": "4.13.97", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A1BF2C7-0945-4325-9514-F2F37E8CE43B", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C7808F-2203-43DF-808C-7A0B85367293", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "61937C14-55DF-4E30-947D-21EC3F418E62", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD7ECC09-0985-44AA-909E-86981CC13A9D", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.10.95:*:*:*:*:*:*:*", "matchCriteriaId": "3A7D10AF-E305-41F4-9154-7071E684C6B6", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.10.97:*:*:*:*:*:*:*", "matchCriteriaId": "B34C3204-4A63-4490-ABED-AF83CE3F37E0", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "39EAE85E-BF52-45EA-82D8-BBBC0DE9759C", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4B4D1998-D62F-4D0E-8E6C-33D4760BE69D", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "13CD2D8F-32F6-4AC4-B43C-506724EA6E38", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.11.3:*:*:*:*:*:*:*", "matchCriteriaId": "4733C600-C5D6-4A5D-A1DF-1F41597F6926", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.11.4:*:*:*:*:*:*:*", "matchCriteriaId": "BC7EBD3A-EDFC-4B8F-9095-5E0670AF991E", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "55EC512F-3F86-40DA-AA7B-034DA9B5DBA3", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.11.80:*:*:*:*:*:*:*", "matchCriteriaId": "08FF236F-A7D5-4D08-8885-BD1889B0D398", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.11.90:*:*:*:*:*:*:*", "matchCriteriaId": "5F5EDED4-34A3-4D2B-A9E7-D980D78E10EA", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.11.95:*:*:*:*:*:*:*", "matchCriteriaId": "46457BB9-BD24-4437-AFDA-01D25E52410E", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.11.97:*:*:*:*:*:*:*", "matchCriteriaId": "52A2D11C-26D2-47F1-9D34-60DB3116C39E", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "A58204C3-0DEC-462B-A6B8-5EC1D9B65729", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "C767A89D-BA45-4730-BA2D-AAC2BA7436E0", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FC4CC-DC0C-44D8-AAF6-A15CF7E6BD5C", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "24629660-4066-4362-AD77-080604488303", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.12.4:*:*:*:*:*:*:*", "matchCriteriaId": "718095EE-ADEC-4E28-B678-DA3D636BBE32", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "EA3E3729-298F-43C3-9BE0-82072FE47F9B", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.12.80:*:*:*:*:*:*:*", "matchCriteriaId": "B6FC3277-8410-437F-813A-63254E983A5F", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.12.90:*:*:*:*:*:*:*", "matchCriteriaId": "88E2B874-46DF-4A95-9541-14CF70E2A73D", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.12.95:*:*:*:*:*:*:*", "matchCriteriaId": "1A593BA6-D3B2-48EE-AC9E-B84967D03B37", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.12.97:*:*:*:*:*:*:*", "matchCriteriaId": "14034B30-9DE0-43EE-A79D-D4FC624D6C86", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "2A34BC1E-102D-43EF-A7BD-46E9866B07ED", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "90E66075-D997-4C6D-94AA-DE224B12BB2D", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "33DCF182-2AD8-4267-B425-1B0A7D2BC0EC", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.13.3:*:*:*:*:*:*:*", "matchCriteriaId": "F572E904-3EE4-4B01-AA7B-EF5F7F643E37", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.13.80:*:*:*:*:*:*:*", "matchCriteriaId": "033ED945-4E0E-41AA-8B02-3BDCC0F27159", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.13.90:*:*:*:*:*:*:*", "matchCriteriaId": "C46B58D8-67F7-4920-8512-CB07C7446976", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kdelibs:4.13.95:*:*:*:*:*:*:*", "matchCriteriaId": "E58C522E-8824-49B7-AAA9-6545E6DD5551", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "KDE kdelibs before 4.14 and kauth before 5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, related to CVE-2013-4288 and \"PID reuse race conditions.\""}, {"lang": "es", "value": "KDE kdelibs anterior a 4.14 y kauth anterior a 5.1 no utilizan debidamente D-Bus para la comunicaci\u00f3n con una autoridad polkit, lo que permite a usuarios locales evadir las restricciones de acceso mediante el aprovechamiento de una condici\u00f3n de carrera PolkitUnixProcess PolkitSubject a trav\u00e9s de un proceso (1) setuid o (2) pkexec, relacionado con el CVE-2013-4288 y 'condiciones de carrera de reuso PID.'"}], "id": "CVE-2014-5033", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2014-08-19T18:55:03.233", "references": [{"source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00012.html"}, {"source": "cve@mitre.org", "url": "http://quickgit.kde.org/?p=kauth.git&a=commit&h=341b7d84b6d9c03cf56905cb277b47e11c81482a"}, {"source": "cve@mitre.org", "tags": ["Exploit", "Patch"], "url": "http://quickgit.kde.org/?p=kdelibs.git&a=commitdiff&h=e4e7b53b71e2659adaf52691d4accc3594203b23"}, {"source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2014-1359.html"}, {"source": "cve@mitre.org", "url": "http://secunia.com/advisories/60385"}, {"source": "cve@mitre.org", "url": "http://secunia.com/advisories/60633"}, {"source": "cve@mitre.org", "url": "http://secunia.com/advisories/60654"}, {"source": "cve@mitre.org", "url": "http://www.debian.org/security/2014/dsa-3004"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.kde.org/info/security/advisory-20140730-1.txt"}, {"source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2304-1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00012.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://quickgit.kde.org/?p=kauth.git&a=commit&h=341b7d84b6d9c03cf56905cb277b47e11c81482a"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Patch"], "url": "http://quickgit.kde.org/?p=kdelibs.git&a=commitdiff&h=e4e7b53b71e2659adaf52691d4accc3594203b23"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1359.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60385"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60633"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60654"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-3004"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.kde.org/info/security/advisory-20140730-1.txt"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2304-1"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-362"}], "source": "nvd@nist.gov", "type": "Primary"}]}