Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2021-4034
Description:A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.
Test IDs: 1.3.6.1.4.1.25623.1.1.2.2022.1493   1.3.6.1.4.1.25623.1.1.2.2022.1335   1.3.6.1.4.1.25623.1.1.4.2022.0191.1   1.3.6.1.4.1.25623.1.0.819595   1.3.6.1.4.1.25623.1.1.2.2022.1698   1.3.6.1.4.1.25623.1.1.2.2022.1512   1.3.6.1.4.1.25623.1.0.884196   1.3.6.1.4.1.25623.1.1.10.2022.0037   1.3.6.1.4.1.25623.1.1.4.2022.0189.1   1.3.6.1.4.1.25623.1.1.2.2022.2527   1.3.6.1.4.1.25623.1.1.13.2022.025.02   1.3.6.1.4.1.25623.1.1.4.2022.0190.1   1.3.6.1.4.1.25623.1.1.2.2022.1359   1.3.6.1.4.1.25623.1.0.845205   1.3.6.1.4.1.25623.1.0.819600   1.3.6.1.4.1.25623.1.0.854445   1.3.6.1.4.1.25623.1.1.2.2022.1420   1.3.6.1.4.1.25623.1.1.2.2022.1419   1.3.6.1.4.1.25623.1.0.705059   1.3.6.1.4.1.25623.1.1.12.2022.5252.2   1.3.6.1.4.1.25623.1.0.892899   1.3.6.1.4.1.25623.1.1.2.2022.1365   1.3.6.1.4.1.25623.1.1.2.2023.1083  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2021-4034
https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/
http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html
http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html
http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html
http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html
https://access.redhat.com/security/vulnerabilities/RHSB-2022-001
https://access.redhat.com/security/vulnerabilities/RHSB-2022-001
https://bugzilla.redhat.com/show_bug.cgi?id=2025869
https://bugzilla.redhat.com/show_bug.cgi?id=2025869
https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf
https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683
https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
https://www.starwindsoftware.com/security/sw-20220818-0001/
https://www.starwindsoftware.com/security/sw-20220818-0001/
https://www.suse.com/support/kb/doc/?id=000020564
https://www.suse.com/support/kb/doc/?id=000020564




© 1998-2025 E-Soft Inc. All rights reserved.