Lucene search

K
gentooGentoo FoundationGLSA-200804-30
HistoryApr 29, 2008 - 12:00 a.m.

KDE start_kdeinit: Multiple vulnerabilities

2008-04-2900:00:00
Gentoo Foundation
security.gentoo.org
16

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

EPSS

0

Percentile

10.1%

Background

KDE is a feature-rich graphical desktop environment for Linux and Unix-like operating systems. start_kdeinit is a wrapper for kdeinit.

Description

Vulnerabilities have been reported in the processing of user-controlled data by start_kdeinit, which is setuid root by default.

Impact

A local attacker could possibly execute arbitrary code with root privileges, cause a Denial of Service or send Unix signals to other processes, when start_kdeinit is setuid root.

Workaround

There is no known workaround at this time.

Resolution

All kdelibs users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=kde-base/kdelibs-3.5.8-r4"
OSVersionArchitecturePackageVersionFilename
Gentooanyallkde-base/kdelibs<Β 4.0UNKNOWN

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

EPSS

0

Percentile

10.1%