Executive Summary

Summary
Title New kdebase packages fix information disclosure
Informations
Name DSA-1156 First vendor Publication 2006-08-27
Vendor Debian Last vendor Modification 2006-08-27
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:H/Au:N/C:C/I:N/A:N)
Cvss Base Score 4 Attack Range Local
Cvss Impact Score 6.9 Attack Complexity High
Cvss Expoit Score 1.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Ludwig Nussel discovered that kdm, the X display manager for KDE, handles access to the session type configuration file insecurely, which may lead to the disclosure of arbitrary files through a symlink attack.

For the stable distribution (sarge) this problem has been fixed in version 3.3.2-1sarge3.

For the unstable distribution (sid) this problem has been fixed in version 3.5.2-2.

We recommend that you upgrade your kdm package.

Original Source

Url : http://www.debian.org/security/2006/dsa-1156

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:9844
 
Oval ID: oval:org.mitre.oval:def:9844
Title: KDE Display Manager (KDM) in KDE 3.2.0 up to 3.5.3 allows local users to read arbitrary files via a symlink attack related to the session type for login.
Description: KDE Display Manager (KDM) in KDE 3.2.0 up to 3.5.3 allows local users to read arbitrary files via a symlink attack related to the session type for login.
Family: unix Class: vulnerability
Reference(s): CVE-2006-2449
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 14

OpenVAS Exploits

Date Description
2008-09-24 Name : Gentoo Security Advisory GLSA 200606-23 (kdebase, KDM)
File : nvt/glsa_200606_23.nasl
2008-01-17 Name : Debian Security Advisory DSA 1156-1 (kdebase)
File : nvt/deb_1156_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
26511 KDE KDM Login Sesson Type Symlink Arbitrary File Read

KDM contains a flaw that may allow a malicious local user to read any files on the system. The issue is due to the 'ReadDmrc()' function reading temporary files insecurely. It is possible for a user to use a symlink style attack to read arbitrary files, resulting in a loss of confidentiality.

Nessus® Vulnerability Scanner

Date Description
2007-11-10 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-301-1.nasl - Type : ACT_GATHER_INFO
2007-10-17 Name : The remote openSUSE host is missing a security update.
File : suse_kdebase3-kdm-1609.nasl - Type : ACT_GATHER_INFO
2007-02-18 Name : The remote host is missing a vendor-supplied security patch
File : suse_SA_2006_039.nasl - Type : ACT_GATHER_INFO
2007-01-17 Name : The remote Fedora Core host is missing a security update.
File : fedora_2006-725.nasl - Type : ACT_GATHER_INFO
2007-01-17 Name : The remote Fedora Core host is missing a security update.
File : fedora_2006-726.nasl - Type : ACT_GATHER_INFO
2006-10-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1156.nasl - Type : ACT_GATHER_INFO
2006-07-05 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2006-0548.nasl - Type : ACT_GATHER_INFO
2006-06-28 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2006-178-01.nasl - Type : ACT_GATHER_INFO
2006-06-23 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200606-23.nasl - Type : ACT_GATHER_INFO
2006-06-16 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2006-105.nasl - Type : ACT_GATHER_INFO
2006-06-16 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2006-0548.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:26:08
  • Multiple Updates