Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2002:042: kdenetwork


Vulnerability Assessment Details

SUSE-SA:2002:042: kdenetwork

Vulnerability Assessment Summary
Check for the version of the kdenetwork package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2002:042 (kdenetwork).


During a security review, the SUSE security team has found two
vulnerabilities in the KDE lanbrowsing service.

LISa is used to identify CIFS and other servers on the local
network, and consists of two main modules: 'lisa', a network daemon,
and 'reslisa', a restricted version of the lisa daemon. LISa can
be accessed in KDE using the URL type 'lan://', and resLISa using
the URL type 'rlan://'.

LISA will obtain information on the local network by looking for
an existing LISA server on other local hosts, and if there is one,
it retrieves the list of servers from it. If there is no other LISA
server, it will scan the network itself.

SUSE LINUX can be configured to run the lisa daemon at system boot
time. The daemon is not started by default, however.

The first vulnerability found is a buffer overflow in the lisa
daemon, and can be exploited by a possible hacker on the local network
to obtain root privilege on a machine running the lisa daemon.
It is not exploitable on a default installation of SUSE LINUX,
because the lisa daemon is not started by default.

The second vulnerability is a buffer overflow in the lan:// URL
handler. It can possibly be exploited by remote attackers to gain
access to the victim user's account, for instance by causing the
user to follow a bad lan:// link in a HTML document.

This update provides fixes for SUSE LINUX 7.2 and 7.3. Previous
updates already corrected the vulnerability in SUSE LINUX 8.0,
and SUSE LINUX 8.1 contains the fix already.

Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command 'rpm -Fhv file.rpm' to apply
the update.

Solution : http://www.suse.de/security/2002_042_kdenetwork.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

AMD APU A12-9800 3.8GHz 4-Core 8-GPU 2M Processor Socket AM4 CPU 65W
$74.0
AMD APU A12-9800 3.8GHz 4-Core 8-GPU 2M Processor Socket AM4 CPU 65W picture8 FRESH AA DURACELL RECHARGEABLE 2500mAh NiMH BATTERIES ION CORE 2 X 4 Packs NEW
$18.49
8 FRESH AA DURACELL RECHARGEABLE 2500mAh NiMH BATTERIES ION CORE 2 X 4 Packs NEW pictureDell Latitude E5470 HD Core i5 Light Business Laptop 8GB 256GB SSD Win 10 Pro
$399.0
Dell Latitude E5470 HD Core i5 Light Business Laptop 8GB 256GB SSD Win 10 Pro picture7 Inch Android Quad Core 4.4 Dual Camera Tablet HD 8GB Bluetooth Wifi Tablet XA
$35.43
7 Inch Android Quad Core 4.4 Dual Camera Tablet HD 8GB Bluetooth Wifi Tablet XA picture


Discussions

No Discussions have been posted on this vulnerability.