Lucene search

K
gentooGentoo FoundationGLSA-200311-01
HistoryNov 15, 2003 - 12:00 a.m.

kdebase: KDM vulnerabilities

2003-11-1500:00:00
Gentoo Foundation
security.gentoo.org
19

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.009 Low

EPSS

Percentile

82.7%

Background

KDM is the desktop manager included with the K Desktop Environment.

Description

Firstly, versions of KDM <=3.1.3 are vulnerable to a privilege escalation bug with a specific configuration of PAM modules. Users who do not use PAM with KDM and users who use PAM with regular Unix crypt/MD5 based authentication methods are not affected.

Secondly, KDM uses a weak cookie generation algorithm. Users are advised to upgrade to KDE 3.1.4, which uses /dev/urandom as a non-predictable source of entropy to improve security.

Impact

A remote or local attacker could gain root privileges.

Workaround

There is no known workaround at this time.

Resolution

It is recommended that all Gentoo Linux users who are running kde-base/kdebase <=3.1.3 upgrade:

 # emerge sync
 # emerge -pv '&gt;=kde-base/kde-3.1.4'
 # emerge '&gt;=kde-base/kde-3.1.4'
 # emerge clean
OSVersionArchitecturePackageVersionFilename
Gentooanyallkde-base/kdebase<= 3.1.3UNKNOWN

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.009 Low

EPSS

Percentile

82.7%