Unrated severityNVD Advisory· Published Nov 5, 2013· Updated Apr 29, 2026
CVE-2013-4419
CVE-2013-4419
Description
The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.
Affected products
3- cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
- cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- bugzilla.redhat.com/show_bug.cginvdPatchThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2013-11/msg00001.htmlnvdMailing ListThird Party Advisory
- rhn.redhat.com/errata/RHSA-2013-1536.htmlnvdThird Party Advisory
- secunia.com/advisories/55813nvdThird Party Advisory
- www.redhat.com/archives/libguestfs/2013-October/msg00031.htmlnvdThird Party Advisory
News mentions
0No linked articles in our index yet.