The klisa package in Debian Security Advisory DSA 214-1 (kdenetwork) before version 2.2.2-14.5 allows local and remote attackers to gain root privileges and access victim's accounts, fix is available
Reporter | Title | Published | Views | Family All 14 |
---|---|---|---|---|
![]() | CAN-2002-1306 | 6 Aug 202410:45 | – | cve |
![]() | CVE-2002-1306 | 29 Nov 200205:00 | – | cve |
![]() | Debian Security Advisory DSA 214-1 (kdenetwork) | 17 Jan 200800:00 | – | openvas |
![]() | CVE-2002-1306 | 21 Nov 200205:00 | – | cvelist |
![]() | Debian DSA-214-1 : kdenetwork - buffer overflows | 29 Sep 200400:00 | – | nessus |
![]() | Mandrake Linux Security Advisory : kdenetwork (MDKSA-2002:080) | 31 Jul 200400:00 | – | nessus |
![]() | RHEL 2.1 : kdelibs (RHSA-2003:003) | 6 Jul 200400:00 | – | nessus |
![]() | RHEL 2.1 : kdelibs (RHSA-2002:221) | 6 Jul 200400:00 | – | nessus |
![]() | kdenetwork - buffer overflows | 20 Dec 200200:00 | – | osv |
![]() | [SECURITY] [DSA 214-1] New kdentwork packages fix buffer overflows | 20 Dec 200216:02 | – | debian |
Source | Link |
---|---|
secure1 | www.secure1.securityspace.com/smysecure/catid.html |
# SPDX-FileCopyrightText: 2008 E-Soft Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.53454");
script_version("2023-07-19T05:05:15+0000");
script_tag(name:"last_modification", value:"2023-07-19 05:05:15 +0000 (Wed, 19 Jul 2023)");
script_tag(name:"creation_date", value:"2008-01-17 22:28:10 +0100 (Thu, 17 Jan 2008)");
script_cve_id("CVE-2002-1306");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_name("Debian Security Advisory DSA 214-1 (kdenetwork)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2008 E-Soft Inc.");
script_family("Debian Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages", re:"ssh/login/release=DEB3\.0");
script_xref(name:"URL", value:"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20214-1");
script_tag(name:"insight", value:"Olaf Kirch from SuSE Linux AG discovered another vulnerability in the
klisa package, that provides a LAN information service similar to
Network Neighbourhood. The lisa daemon contains a buffer overflow
vulnerability which potentially enables any local user, as well any
any remote attacker on the LAN who is able to gain control of the LISa
port (7741 by default), to obtain root privileges. In addition, a
remote attacker potentially may be able to gain access to a victim's
account by using an rlan:// URL in an HTML page or via another KDE
application.
This problem has been fixed in version 2.2.2-14.5 for the current
stable distribution (woody) and in version 2.2.2-14.20 for the
unstable distribution (sid). The old stable distribution (potato) is
not affected since it doesn't contain a kdenetwork package.");
script_tag(name:"solution", value:"We recommend that you upgrade your klisa package immediately.");
script_tag(name:"summary", value:"The remote host is missing an update to kdenetwork
announced via advisory DSA 214-1.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-deb.inc");
res = "";
report = "";
if((res = isdpkgvuln(pkg:"kdict", ver:"2.2.2-14.5", rls:"DEB3.0")) != NULL) {
report += res;
}
if((res = isdpkgvuln(pkg:"kit", ver:"2.2.2-14.5", rls:"DEB3.0")) != NULL) {
report += res;
}
if((res = isdpkgvuln(pkg:"klisa", ver:"2.2.2-14.5", rls:"DEB3.0")) != NULL) {
report += res;
}
if((res = isdpkgvuln(pkg:"kmail", ver:"2.2.2-14.5", rls:"DEB3.0")) != NULL) {
report += res;
}
if((res = isdpkgvuln(pkg:"knewsticker", ver:"2.2.2-14.5", rls:"DEB3.0")) != NULL) {
report += res;
}
if((res = isdpkgvuln(pkg:"knode", ver:"2.2.2-14.5", rls:"DEB3.0")) != NULL) {
report += res;
}
if((res = isdpkgvuln(pkg:"korn", ver:"2.2.2-14.5", rls:"DEB3.0")) != NULL) {
report += res;
}
if((res = isdpkgvuln(pkg:"kppp", ver:"2.2.2-14.5", rls:"DEB3.0")) != NULL) {
report += res;
}
if((res = isdpkgvuln(pkg:"ksirc", ver:"2.2.2-14.5", rls:"DEB3.0")) != NULL) {
report += res;
}
if((res = isdpkgvuln(pkg:"ktalkd", ver:"2.2.2-14.5", rls:"DEB3.0")) != NULL) {
report += res;
}
if((res = isdpkgvuln(pkg:"libkdenetwork1", ver:"2.2.2-14.5", rls:"DEB3.0")) != NULL) {
report += res;
}
if((res = isdpkgvuln(pkg:"libmimelib-dev", ver:"2.2.2-14.5", rls:"DEB3.0")) != NULL) {
report += res;
}
if((res = isdpkgvuln(pkg:"libmimelib1", ver:"2.2.2-14.5", rls:"DEB3.0")) != NULL) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo