Lucene search

K
gentooGentoo FoundationGLSA-201812-10
HistoryDec 30, 2018 - 12:00 a.m.

GKSu: Arbitrary command execution

2018-12-3000:00:00
Gentoo Foundation
security.gentoo.org
23

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

6.9

Confidence

Low

EPSS

0.006

Percentile

78.0%

Background

A library that provides a Gtk+ frontend to su and sudo.

Description

A vulnerability was discovered in GKSu’s gksu-run-helper.

Impact

An attacker could execute arbitrary commands.

Workaround

There is no known workaround at this time.

Resolution

Gentoo has discontinued support for GKSu and recommends that users unmerge the package:

 # emerge --unmerge "x11-libs/gksu"
OSVersionArchitecturePackageVersionFilename
Gentooanyallx11-libs/gksu<= 2.0.2UNKNOWN

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

6.9

Confidence

Low

EPSS

0.006

Percentile

78.0%