Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Slackware Local Security Checks >> SSA-2005-251-01 kcheckpass in kdebase


Vulnerability Assessment Details

SSA-2005-251-01 kcheckpass in kdebase

Vulnerability Assessment Summary
SSA-2005-251-01 kcheckpass in kdebase

Detailed Explanation for this Vulnerability Assessment

New kdebase packages are available for Slackware 10.0, 10.1, and -current to
fix a security issue with the kcheckpass program. Earlier versions of
Slackware are not affected. A flaw in the way the program creates lockfiles
could permit a local attacker to gain root rights.

For more details about the issue, see:

http://www.kde.org/info/security/advisory-20050905-1.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2494




Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Michel Arboi

Cables, Connectors

Cisco Linksys E2000 Router WITH ADAPTER AND ETHERNET CORD USED TESTED WORKING
$20.0
Cisco Linksys E2000 Router WITH ADAPTER AND ETHERNET CORD USED TESTED WORKING  pictureCISCO1921 K9 ISR G2
$375.0
CISCO1921 K9 ISR G2 pictureCISCO 5 SEALED DS-SFP-FC8G-SW (IN ORIGINAL PACKING)
$80.0
CISCO 5 SEALED DS-SFP-FC8G-SW (IN ORIGINAL PACKING) pictureCisco Catalyst 2960-S Series SI WS-C2960S-24TS-S V04 10/100/1000 1G SFP Switch
$5.0
Cisco Catalyst 2960-S Series SI WS-C2960S-24TS-S V04 10/100/1000 1G SFP Switch  picture


Discussions

No Discussions have been posted on this vulnerability.