Lucene search

K

Debian Security Advisory DSA 692-1 (kdenetwork)

🗓️ 17 Jan 2008 00:00:00Reported by Copyright (c) 2005 E-Soft Inc. http://www.securityspace.comType 
openvas
 openvas
🔗 plugins.openvas.org👁 18 Views

This is a Debian Security Advisory DSA 692-1 for kdenetwork. The KDE team fixed a bug in kppp in 2002 which was discovered to be exploitable by iDEFENSE. By opening a sufficiently large number of file descriptors before executing kppp, a local attacker is able to take over privileged file descriptors. For the stable distribution (woody), this problem has been fixed in version 2.2.2-14.7. The testing (sarge) and unstable (sid) distributions are not affected since KDE 3.2 already contained the correction. It is recommended to upgrade the kppp package

Show more
Related
Code
ReporterTitlePublishedViews
Family
UbuntuCve
CVE-2005-0205
2 May 200500:00
ubuntucve
OSV
RHSA-2005:175 Red Hat Security Advisory: kdenetwork security update
17 Sep 202400:33
osv
OSV
kppp - design flaw
8 Mar 200500:00
osv
Tenable Nessus
RHEL 2.1 / 3 : kdenetwork (RHSA-2005:175)
4 Mar 200500:00
nessus
Tenable Nessus
Debian DSA-692-1 : kdenetwork - design flaw
9 Mar 200500:00
nessus
securityvulns
iDEFENSE Security Advisory 02.28.05: KPPP Privileged File Descriptor Leak Vulnerability
28 Feb 200500:00
securityvulns
CVE
CVE-2005-0205
2 May 200504:00
cve
RedHat Linux
(RHSA-2005:175) kdenetwork security update
3 Mar 200500:00
redhat
Cvelist
CVE-2005-0205
28 Feb 200505:00
cvelist
NVD
CVE-2005-0205
2 May 200504:00
nvd
Rows per page
# OpenVAS Vulnerability Test
# $Id: deb_692_1.nasl 6616 2017-07-07 12:10:49Z cfischer $
# Description: Auto-generated from advisory DSA 692-1
#
# Authors:
# Thomas Reinke <[email protected]>
#
# Copyright:
# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com
# Text descriptions are largerly excerpted from the referenced
# advisory, and are Copyright (c) the respective author(s)
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#

include("revisions-lib.inc");
tag_insight = "The KDE team fixed a bug in kppp in 2002 which was now discovered to be
exploitable by iDEFENSE.  By opening a sufficiently large number of
file descriptors before executing kppp which is installed setuid root a
local attacker is able to take over privileged file descriptors.

For the stable distribution (woody) this problem has been fixed in
version 2.2.2-14.7.

The testing (sarge) and unstable (sid) distributions are not affected
since KDE 3.2 already contained the correction.

We recommend that you upgrade your kppp package.";
tag_summary = "The remote host is missing an update to kdenetwork
announced via advisory DSA 692-1.";

tag_solution = "https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20692-1";

if(description)
{
 script_id(53522);
 script_version("$Revision: 6616 $");
 script_tag(name:"last_modification", value:"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $");
 script_tag(name:"creation_date", value:"2008-01-17 22:56:38 +0100 (Thu, 17 Jan 2008)");
 script_cve_id("CVE-2005-0205");
 script_tag(name:"cvss_base", value:"4.6");
 script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:P/I:P/A:P");
 script_name("Debian Security Advisory DSA 692-1 (kdenetwork)");



 script_category(ACT_GATHER_INFO);

 script_copyright("Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com");
 script_family("Debian Local Security Checks");
 script_dependencies("gather-package-list.nasl");
 script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages");
 script_tag(name : "solution" , value : tag_solution);
 script_tag(name : "insight" , value : tag_insight);
 script_tag(name : "summary" , value : tag_summary);
 script_tag(name:"qod_type", value:"package");
 script_tag(name:"solution_type", value:"VendorFix");
 exit(0);
}

#
# The script code starts here
#

include("pkg-lib-deb.inc");

res = "";
report = "";
if ((res = isdpkgvuln(pkg:"kdict", ver:"2.2.2-14.7", rls:"DEB3.0")) != NULL) {
    report += res;
}
if ((res = isdpkgvuln(pkg:"kit", ver:"2.2.2-14.7", rls:"DEB3.0")) != NULL) {
    report += res;
}
if ((res = isdpkgvuln(pkg:"klisa", ver:"2.2.2-14.7", rls:"DEB3.0")) != NULL) {
    report += res;
}
if ((res = isdpkgvuln(pkg:"kmail", ver:"2.2.2-14.7", rls:"DEB3.0")) != NULL) {
    report += res;
}
if ((res = isdpkgvuln(pkg:"knewsticker", ver:"2.2.2-14.7", rls:"DEB3.0")) != NULL) {
    report += res;
}
if ((res = isdpkgvuln(pkg:"knode", ver:"2.2.2-14.7", rls:"DEB3.0")) != NULL) {
    report += res;
}
if ((res = isdpkgvuln(pkg:"korn", ver:"2.2.2-14.7", rls:"DEB3.0")) != NULL) {
    report += res;
}
if ((res = isdpkgvuln(pkg:"kppp", ver:"2.2.2-14.7", rls:"DEB3.0")) != NULL) {
    report += res;
}
if ((res = isdpkgvuln(pkg:"ksirc", ver:"2.2.2-14.7", rls:"DEB3.0")) != NULL) {
    report += res;
}
if ((res = isdpkgvuln(pkg:"ktalkd", ver:"2.2.2-14.7", rls:"DEB3.0")) != NULL) {
    report += res;
}
if ((res = isdpkgvuln(pkg:"libkdenetwork1", ver:"2.2.2-14.7", rls:"DEB3.0")) != NULL) {
    report += res;
}
if ((res = isdpkgvuln(pkg:"libmimelib-dev", ver:"2.2.2-14.7", rls:"DEB3.0")) != NULL) {
    report += res;
}
if ((res = isdpkgvuln(pkg:"libmimelib1", ver:"2.2.2-14.7", rls:"DEB3.0")) != NULL) {
    report += res;
}

if (report != "") {
    security_message(data:report);
} else if (__pkg_match) {
    exit(99); # Not vulnerable.
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
17 Jan 2008 00:00Current
0.1Low risk
Vulners AI Score0.1
EPSS0.00042
18
.json
Report