Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 600455 - (CVE-2010-4664) CVE-2010-4664 ConsoleKit: Policy restrictions break-out via remote Virtual Network Computing (VNC) session
CVE-2010-4664 ConsoleKit: Policy restrictions break-out via remote Virtual Ne...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 585952
Blocks: 712420
  Show dependency treegraph
Reported: 2010-06-04 14:20 EDT by Jan Lieskovsky
Modified: 2018-01-29 20:00 EST (History)
4 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Jan Lieskovsky 2010-06-04 14:20:59 EDT
An intended security policy restriction bypass was found in the way ConsoleKit 
identified VNC sessions originating from remote host. A valid, authenticated
system user could use this flaw to escalate their privileges (become
member of more privileged policy group) by initiating a remote VNC session.

Upstream bug report:
  [1] https://bugs.freedesktop.org/show_bug.cgi?id=28377
Comment 1 Jan Lieskovsky 2010-06-04 14:22:48 EDT
This issue affects the versions of the ConsoleKit package, as shipped
with Fedora release of 11, 12, and 13.

This issue affects the version of the ConsoleKit package as shipped with Red Hat Enterprise Linux 6.
Comment 3 Josh Bressers 2011-04-07 13:05:00 EDT
This is public via the upstream bug. I'm opening this up.

I've assigned this bug CVE-2010-4664
Comment 5 Stefan Cornelius 2013-03-15 09:00:58 EDT

The Red Hat Security Response Team has rated this issue as having moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Note You need to log in before you can comment on or make changes to this bug.