RHEL 4 kdebase update for low security impac
Reporter | Title | Published | Views | Family All 24 |
---|---|---|---|---|
![]() | [SECURITY] [DSA 815-1] New kdebase packages fix local root vulnerability | 16 Sep 200513:21 | – | debian |
![]() | [SECURITY] [DSA 815-1] New kdebase packages fix local root vulnerability | 16 Sep 200513:21 | – | debian |
![]() | Slackware 10.0 / 10.1 / current : kcheckpass in kdebase (SSA:2005-251-01) | 5 Oct 200500:00 | – | nessus |
![]() | Mandrake Linux Security Advisory : kdebase (MDKSA-2005:160) | 5 Oct 200500:00 | – | nessus |
![]() | CentOS 4 : kdebase (CESA-2006:0582) | 30 Aug 200600:00 | – | nessus |
![]() | Ubuntu 5.04 : kdebase vulnerability (USN-176-1) | 15 Jan 200600:00 | – | nessus |
![]() | Debian DSA-815-1 : kdebase - programming error | 17 Sep 200500:00 | – | nessus |
![]() | Ubuntu: Security Advisory (USN-176-1) | 26 Aug 202200:00 | – | openvas |
![]() | Slackware Advisory SSA:2005-251-01 kcheckpass in kdebase | 11 Sep 201200:00 | – | openvas |
![]() | Debian Security Advisory DSA 815-1 (kdebase) | 17 Jan 200800:00 | – | openvas |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Red Hat Security Advisory RHSA-2006:0582. The text
# itself is copyright (C) Red Hat, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(22222);
script_version("1.23");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_cve_id("CVE-2005-2494");
script_xref(name:"RHSA", value:"2006:0582");
script_name(english:"RHEL 4 : kdebase (RHSA-2006:0582)");
script_summary(english:"Checks the rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:"The remote Red Hat host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"Updated kdebase packages that resolve several bugs are now available.
This update has been rated as having low security impact by the Red
Hat Security Response Team.
The kdebase packages provide the core applications for KDE, the K
Desktop Environment. These core packages include the file manager
Konqueror.
Ilja van Sprundel discovered a lock file handling flaw in kcheckpass.
If the directory /var/lock is writable by a user who is allowed to run
kcheckpass, that user could gain root privileges. In Red Hat
Enterprise Linux, the /var/lock directory is not writable by users and
therefore this flaw could only have been exploited if the permissions
on that directory have been badly configured. A patch to block this
issue has been included in this update. (CVE-2005-2494)
The following bugs have also been addressed :
- kstart --tosystray does not send the window to the
system tray in Kicker
- When the customer enters or selects URLs in Firefox's
address field, the desktop freezes for a couple of
seconds
- fish kioslave is broken on 64-bit systems
All users of kdebase should upgrade to these updated packages, which
contain patches to resolve these issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2005-2494"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/errata/RHSA-2006:0582"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected kdebase and / or kdebase-devel packages."
);
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kdebase");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kdebase-devel");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:4");
script_set_attribute(attribute:"vuln_publication_date", value:"2005/09/06");
script_set_attribute(attribute:"patch_publication_date", value:"2006/08/10");
script_set_attribute(attribute:"plugin_publication_date", value:"2006/08/14");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Red Hat Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
os_ver = os_ver[1];
if (! preg(pattern:"^4([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 4.x", "Red Hat " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
if (!empty_or_null(yum_updateinfo))
{
rhsa = "RHSA-2006:0582";
yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
if (!empty_or_null(yum_report))
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : yum_report
);
exit(0);
}
else
{
audit_message = "affected by Red Hat security advisory " + rhsa;
audit(AUDIT_OS_NOT, audit_message);
}
}
else
{
flag = 0;
if (rpm_check(release:"RHEL4", reference:"kdebase-3.3.1-5.13")) flag++;
if (rpm_check(release:"RHEL4", reference:"kdebase-devel-3.3.1-5.13")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get() + redhat_report_package_caveat()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "kdebase / kdebase-devel");
}
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo