exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

KDE Security Advisory 2004-08-11.1

KDE Security Advisory 2004-08-11.1
Posted Aug 12, 2004
Authored by KDE Desktop | Site kde.org

KDE Security Advisory - The SUSE security team was alerted that in some cases the integrity of symlinks used by KDE are not ensured and that these symlinks can be pointing to stale locations. This can be abused by a local attacker to create or truncate arbitrary files or to prevent KDE applications from functioning correctly (Denial of Service). All versions of KDE up to KDE 3.2.3 inclusive.

tags | advisory, denial of service, arbitrary, local
systems | linux, suse
advisories | CVE-2004-0689
SHA-256 | ca4d4d4bce4848177851839010191e887247b3048ad18fc61311b63b0761a215

KDE Security Advisory 2004-08-11.1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

KDE Security Advisory: Temporary Directory Vulnerability
Original Release Date: 2004-08-11
URL: http://www.kde.org/info/security/advisory-20040811-1.txt

0. References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0689


1. Systems affected:

All versions of KDE up to KDE 3.2.3 inclusive.


2. Overview:

The SUSE security team was alerted that in some cases the
integrity of symlinks used by KDE are not ensured and that
these symlinks can be pointing to stale locations. This can
be abused by a local attacker to create or truncate arbitrary
files or to prevent KDE applications from functioning
correctly (Denial of Service).

KDE creates in ~/.kde symlinks to a temporary directory, a socket
directory and a cache directory. When a user logs into the KDE
environment the startkde script ensures that these symlinks are
present and point to directories that are owned by the user.
However, when a user runs KDE applications outside the KDE
environment or when a user runs a KDE applications as another user,
such as root, the integrity of these symlinks is not checked and it
is possible that a previously created but now stale symlinks exist.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CAN-2004-0689 to this issue.


3. Impact:

When a stale symlink is present a local attacker could create the
directory that the symlink is pointing to with his own credentials
to prevent access to this directory by KDE applications. This can
prevent KDE applications from functioning correctly.

When a stale symlink is present a local attacker could create the
directory that the symlink is pointing to with his own credentials.
Since KDE applications will attempt to create files with certain
known names in this directory, an attacker can abuse this to overwrite
arbitrary files with the privileges of the user.


4. Solution:

Source code patches have been made available which fix these
vulnerabilities. Contact your OS vendor / binary package provider
for information about how to obtain updated binary packages.


5. Patch:

Patches for KDE 3.0.5b are available from
ftp://ftp.kde.org/pub/kde/security_patches :

da950a651e69cd810019efce284120fc post-3.0.5b-kdelibs-kstandarddirs.patch

Patches for KDE 3.1.5 are available from
ftp://ftp.kde.org/pub/kde/security_patches :

c97ab0cf014adb59e315047210316f5d post-3.1.5-kdelibs-kstandarddirs.patch

Patches for KDE 3.2.3 are available from
ftp://ftp.kde.org/pub/kde/security_patches :

345ce2e01cfdfa4754c47894c0271dcc post-3.2.3-kdelibs-kstandarddirs.patch


6. Time line and credits:


23/06/2004 SUSE Security Team alerted by Andrew Tuitt
26/06/2004 Patches created
27/07/2004 Vendors notified
11/08/2004 Public advisory

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQFBGioUN4pvrENfboIRAnALAJ9ynwVAnzRtkDghmItkkCTe8qu/eACfabZc
X/9KZihVfSQKjOHvmvBOzv0=
=VM4l
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close