Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-dn8s-xk69-qugj
Vulnerability ID VCID-dn8s-xk69-qugj
Aliases CVE-2011-1485
Summary Multiple vulnerabilities have been found in PolicyKit, the worst of which may allow a local attacker to gain root privileges.
Status Published
Exploitability 2.0
Weighted Severity 6.2
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058752.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/059859.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1485.json
https://api.first.org/data/v1/epss?cve=CVE-2011-1485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1485
http://secunia.com/advisories/48817
http://security.gentoo.org/glsa/glsa-201204-06.xml
http://securityreason.com/securityalert/8424
http://www.debian.org/security/2011/dsa-2319
http://www.mandriva.com/security/advisories?name=MDVSA-2011:086
http://www.redhat.com/support/errata/RHSA-2011-0455.html
http://www.ubuntu.com/usn/USN-1117-1
644500 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=644500
692922 https://bugzilla.redhat.com/show_bug.cgi?id=692922
cpe:2.3:a:redhat:policykit:0.96:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:policykit:0.96:*:*:*:*:*:*:*
CVE-2011-1485 https://nvd.nist.gov/vuln/detail/CVE-2011-1485
CVE-2011-1485;OSVDB-72261 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/17932.c
CVE-2011-1485;OSVDB-72261 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/17942.c
CVE-2011-1485;OSVDB-72261 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/35021.rb
GLSA-201204-06 https://security.gentoo.org/glsa/201204-06
RHSA-2011:0455 https://access.redhat.com/errata/RHSA-2011:0455
USN-1117-1 https://usn.ubuntu.com/1117-1/
Data source Exploit-DB
Date added Oct. 5, 2011
Description PolicyKit polkit-1 < 0.101 - Local Privilege Escalation
Ransomware campaign use Unknown
Source publication date Oct. 5, 2011
Exploit type local
Platform linux
Source update date Oct. 5, 2011
Data source Metasploit
Description A race condition flaw was found in the PolicyKit pkexec utility and polkitd daemon. A local user could use this flaw to appear as a privileged user to pkexec, allowing them to execute arbitrary commands as root by running those commands with pkexec. Those vulnerable include RHEL6 prior to polkit-0.96-2.el6_0.1 and Ubuntu libpolkit-backend-1 prior to 0.96-2ubuntu1.1 (10.10) 0.96-2ubuntu0.1 (10.04 LTS) and 0.94-1ubuntu1.1 (9.10)
Note
Reliability:
  - unknown-reliability
Stability:
  - unknown-stability
SideEffects:
  - unknown-side-effects
Ransomware campaign use Unknown
Source publication date April 1, 2011
Platform Linux
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/linux/local/pkexec.rb
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2011-1485
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.91768
EPSS Score 0.07522
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:01:22.564306+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/201204-06 38.0.0