|| ||Dirk Mueller <mueller-AT-kde.org>|
|| ||[kde-announce] [KDE Security Advisory] kcheckpass local root
|| ||Mon, 5 Sep 2005 13:12:26 +0200|
KDE Security Advisory: kcheckpass local root vulnerability
Original Release Date: 2008-09-05
1. Systems affected:
All KDE releases starting from KDE 3.2.0 up to including
Ilja van Sprundel from suresec.org notified the KDE
security team about a serious lock file handling error
in kcheckpass that can, in some configurations, be used
to gain root access.
In order for an exploit to succeed, the directory /var/lock
has to be writeable for a user that is allowed to invoke
A local user can escalate its privileges to the root user.
Source code patches have been made available which fix these
vulnerabilities. Contact your OS vendor / binary package provider
for information about how to obtain updated binary packages.
Patch for KDE 3.4.2 is available from
kde-announce mailing list
to post comments)