exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 16715

Secunia Security Advisory 16715
Posted Sep 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for kdebase. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, mandriva
SHA-256 | c9168339d2a8b39bc589ff5e0079a3be84a9b81eb98aa83be2ec269e0719ecd5

Secunia Security Advisory 16715

Change Mirror Download


----------------------------------------------------------------------

Bist Du interessiert an einem neuen Job in IT-Sicherheit?


Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/

----------------------------------------------------------------------

TITLE:
Mandriva update for kdebase

SECUNIA ADVISORY ID:
SA16715

VERIFY ADVISORY:
http://secunia.com/advisories/16715/

CRITICAL:
Less critical

IMPACT:
Privilege escalation

WHERE:
Local system

OPERATING SYSTEM:
Mandrakelinux 10.1
http://secunia.com/product/4198/

DESCRIPTION:
Mandriva has issued an update for kdebase. This fixes a
vulnerability, which potentially can be exploited by malicious, local
users to gain escalated privileges.

For more information:
SA16692

SOLUTION:
Apply updated packages.

Mandrakelinux 10.1

fde6f11dca5fa72d8b892326ef18af39
10.1/RPMS/kdebase-3.2.3-134.9.101mdk.i586.rpm
af8c908d2d1e82d38057d8c2a85226ae
10.1/RPMS/kdebase-common-3.2.3-134.9.101mdk.i586.rpm
82059179465feed8f4aa87eeb09083c6
10.1/RPMS/kdebase-kate-3.2.3-134.9.101mdk.i586.rpm
31551dc2a3ccd80305a0b7aec7d525a2
10.1/RPMS/kdebase-kcontrol-data-3.2.3-134.9.101mdk.i586.rpm
256d4d84ec2af022ca1a91f91f4becbe
10.1/RPMS/kdebase-kcontrol-nsplugins-3.2.3-134.9.101mdk.i586.rpm
bc75565668aee981f4170b082c875973
10.1/RPMS/kdebase-kdeprintfax-3.2.3-134.9.101mdk.i586.rpm
3b1aa69777ca0380a598687febccf3cf
10.1/RPMS/kdebase-kdm-3.2.3-134.9.101mdk.i586.rpm
c4aa598c9468d30370eca266e5cd26d2
10.1/RPMS/kdebase-kdm-config-file-3.2.3-134.9.101mdk.i586.rpm
a3a5bfacdfbeda1e5674c8c85ce33d06
10.1/RPMS/kdebase-kmenuedit-3.2.3-134.9.101mdk.i586.rpm
43989b4186ca73c933c0a14e6e8ada7e
10.1/RPMS/kdebase-konsole-3.2.3-134.9.101mdk.i586.rpm
27eb9535ade339cc18745238cdca82e7
10.1/RPMS/kdebase-nsplugins-3.2.3-134.9.101mdk.i586.rpm
2e150c90e33b4895f03afd0f150ef133
10.1/RPMS/kdebase-progs-3.2.3-134.9.101mdk.i586.rpm
5a01676e0b14f1dcfdc354f36c809a15
10.1/RPMS/libkdebase4-3.2.3-134.9.101mdk.i586.rpm
933a50f6b133a925553ebc500ffc77b2
10.1/RPMS/libkdebase4-devel-3.2.3-134.9.101mdk.i586.rpm
d047b4804fa7ef86a4e358f4fa905062
10.1/RPMS/libkdebase4-kate-3.2.3-134.9.101mdk.i586.rpm
75aa31fb0122567a8f61b27c6a6b97e3
10.1/RPMS/libkdebase4-kate-devel-3.2.3-134.9.101mdk.i586.rpm
11d99a0db991f5ce81069d5a3b04996c
10.1/RPMS/libkdebase4-kmenuedit-3.2.3-134.9.101mdk.i586.rpm
1d68a5e0a0ee1e9b683726394ef1d9d4
10.1/RPMS/libkdebase4-konsole-3.2.3-134.9.101mdk.i586.rpm
79e2da009c3444e9fc8bae76a8e4bc58
10.1/SRPMS/kdebase-3.2.3-134.9.101mdk.src.rpm

Mandrakelinux 10.1/X86_64

3edfcb2be06588148b7dbea26ddeb0ab
x86_64/10.1/RPMS/kdebase-3.2.3-134.9.101mdk.x86_64.rpm
c2222b94addf5138736253d3591fe8a5
x86_64/10.1/RPMS/kdebase-common-3.2.3-134.9.101mdk.x86_64.rpm
cbb30cf71ef0ee26a742425cc0131a57
x86_64/10.1/RPMS/kdebase-kate-3.2.3-134.9.101mdk.x86_64.rpm
ee1cd14197f0978fe6683d732be2d9a9
x86_64/10.1/RPMS/kdebase-kcontrol-data-3.2.3-134.9.101mdk.x86_64.rpm
9415b5810205fa4a6e40e158d73bb793
x86_64/10.1/RPMS/kdebase-kcontrol-nsplugins-3.2.3-134.9.101mdk.x86_64.rpm
3b273879aba8c243abd365032cc12e10
x86_64/10.1/RPMS/kdebase-kdeprintfax-3.2.3-134.9.101mdk.x86_64.rpm
d263866608db223d7c8003d873885327
x86_64/10.1/RPMS/kdebase-kdm-3.2.3-134.9.101mdk.x86_64.rpm
c0e041f29979178df76dc8ae20f5c71f
x86_64/10.1/RPMS/kdebase-kdm-config-file-3.2.3-134.9.101mdk.x86_64.rpm
53ea70085e2b73a1fcf716307b3c1f7a
x86_64/10.1/RPMS/kdebase-kmenuedit-3.2.3-134.9.101mdk.x86_64.rpm
24c0b0f3cf506ce3c0fa4ea383c43312
x86_64/10.1/RPMS/kdebase-konsole-3.2.3-134.9.101mdk.x86_64.rpm
72c06b57b925085a85ea1532299a8c12
x86_64/10.1/RPMS/kdebase-nsplugins-3.2.3-134.9.101mdk.x86_64.rpm
f2b612031c9b753acdeca70da2761c14
x86_64/10.1/RPMS/kdebase-progs-3.2.3-134.9.101mdk.x86_64.rpm
2be4621405105330c569a2d3371f7912
x86_64/10.1/RPMS/lib64kdebase4-3.2.3-134.9.101mdk.x86_64.rpm
47fa9328d312663c970a0ea02f7ece97
x86_64/10.1/RPMS/lib64kdebase4-devel-3.2.3-134.9.101mdk.x86_64.rpm
2c46a175a2d53cc9e71e1c7e80fc515f
x86_64/10.1/RPMS/lib64kdebase4-kate-3.2.3-134.9.101mdk.x86_64.rpm
7ca3088d0a3fde613c6fc99bff434904
x86_64/10.1/RPMS/lib64kdebase4-kate-devel-3.2.3-134.9.101mdk.x86_64.rpm
4333de20ac19527f2ed54590e13c668e
x86_64/10.1/RPMS/lib64kdebase4-kmenuedit-3.2.3-134.9.101mdk.x86_64.rpm
45b52dcf04ef25fecc47179f699e8c6a
x86_64/10.1/RPMS/lib64kdebase4-konsole-3.2.3-134.9.101mdk.x86_64.rpm
5a01676e0b14f1dcfdc354f36c809a15
x86_64/10.1/RPMS/libkdebase4-3.2.3-134.9.101mdk.i586.rpm
d047b4804fa7ef86a4e358f4fa905062
x86_64/10.1/RPMS/libkdebase4-kate-3.2.3-134.9.101mdk.i586.rpm
11d99a0db991f5ce81069d5a3b04996c
x86_64/10.1/RPMS/libkdebase4-kmenuedit-3.2.3-134.9.101mdk.i586.rpm
1d68a5e0a0ee1e9b683726394ef1d9d4
x86_64/10.1/RPMS/libkdebase4-konsole-3.2.3-134.9.101mdk.i586.rpm
79e2da009c3444e9fc8bae76a8e4bc58
x86_64/10.1/SRPMS/kdebase-3.2.3-134.9.101mdk.src.rpm

ORIGINAL ADVISORY:
http://www.mandriva.com/security/advisories?name=MDKSA-2005:160

OTHER REFERENCES:
SA16692:
http://secunia.com/advisories/16692/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close