Access Restriction Bypass Affecting busybox package, versions <1:1.15.1-20.el6
Threat Intelligence
EPSS
0.04% (6th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL6-BUSYBOX-1474461
- published 26 Jul 2021
- disclosed 1 Mar 2013
Introduced: 1 Mar 2013
CVE-2013-1813 Open this link in a new tabHow to fix?
Upgrade RHEL:6 busybox to version 1:1.15.1-20.el6 or higher.
This issue was patched in RHSA-2013:1732.
NVD Description
Note: Versions mentioned in the description apply only to the upstream busybox package and not the busybox package as distributed by RHEL.
See How to fix? for RHEL:6 relevant fixed versions and status.
util-linux/mdev.c in BusyBox before 1.21.0 uses 0777 permissions for parent directories when creating nested directories under /dev/, which allows local users to have unknown impact and attack vectors.
References
- https://seclists.org/bugtraq/2019/Jun/14
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701965
- http://git.busybox.net/busybox/commit/?id=4609f477c7e043a4f6147dfe6e86b775da2ef784
- https://support.t-mobile.com/docs/DOC-21994
- https://access.redhat.com/security/cve/CVE-2013-1813
- http://seclists.org/fulldisclosure/2019/Jun/18
- http://seclists.org/fulldisclosure/2020/Aug/20
- http://seclists.org/fulldisclosure/2020/Mar/15
- http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
- http://lists.busybox.net/pipermail/busybox/2013-January/078864.html
- http://rhn.redhat.com/errata/RHSA-2013-1732.html
- https://access.redhat.com/errata/RHSA-2013:1732
CVSS Scores
version 3.1