Lucene search

K
freebsdFreeBSD3987C5D1-47A9-11DF-A0D5-0016D32F24FB
HistoryApr 13, 2010 - 12:00 a.m.

KDM -- local privilege escalation vulnerability

2010-04-1300:00:00
vuxml.freebsd.org
29

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

9.3%

KDE Security Advisory reports:

KDM contains a race condition that allows local attackers
to make arbitrary files on the system world-writeable.
This can happen while KDM tries to create its control
socket during user login. A local attacker with a valid
local account can under certain circumstances make use of
this vulnerability to execute arbitrary code as root.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchkdebase<= 3.5.10_6UNKNOWN
FreeBSDanynoarchkdebase-workspace<= 4.3.5_1UNKNOWN

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

9.3%