Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200606-23] KDM: Symlink vulnerability


Vulnerability Assessment Details

[GLSA-200606-23] KDM: Symlink vulnerability

Vulnerability Assessment Summary
KDM: Symlink vulnerability

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200606-23
(KDM: Symlink vulnerability)


Ludwig Nussel discovered that KDM could be tricked into permiting users
to read files that would otherwise not be readable.

Impact

A local attacker could exploit this issue to obtain potentially
sensitive information that is usually not accessable to the local user
such as shadow files or other user's files. The default Gentoo user
running KDM is root and, as a result, the local attacker can read any
file.

Workaround

There is no known workaround at this time.

References:
http://www.kde.org/info/security/advisory-20060614-1.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2449


Solution:
All kdebase users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose kde-base/kdebase
All KDE split ebuild users should upgrade to the latest KDM version:
# emerge --sync
# emerge --ask --oneshot --verbose kde-base/kdm


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2006 Michel Arboi

Cables, Connectors

S-69 Silicon Graphics SGI Octane CMNB015ANF195 Server Workstation Tower As Is
$69.99
S-69 Silicon Graphics SGI Octane CMNB015ANF195 Server Workstation Tower As Is pictureHP DL380p G8 Single E5-2660 8C 2.2GHz 8GB 8x 600GB 15K SAS P420/1GB Rails RPS
$3300.0
HP DL380p G8 Single E5-2660 8C 2.2GHz 8GB 8x 600GB 15K SAS P420/1GB Rails RPS pictureDell PowerEdge R620 Server Dual Xeon E5-2667 v2 8C 3.3GHz 48GB 10 Bay
$1550.0
Dell PowerEdge R620 Server Dual Xeon E5-2667 v2 8C 3.3GHz 48GB 10 Bay pictureHP Proliant DL360 G7 server, 2x 3.06GHz HexaCore, 128GB RAM, 8x 600GB 6G SAS
$949.99
HP Proliant DL360 G7 server, 2x 3.06GHz HexaCore, 128GB RAM, 8x 600GB 6G SAS picture


Discussions

No Discussions have been posted on this vulnerability.