The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[KDE Security Advisory] kppp Privileged fd Leak Vulnerability


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: Dirk Mueller <dirk@kde.org.>
To: [email protected]
Subject: [KDE Security Advisory] kppp Privileged fd Leak Vulnerability
Date: Tue, 1 Mar 2005 00:45:15 +0100
User-Agent: KMail/1.8
MIME-Version: 1.0
Content-Type: multipart/signed;
  boundary="nextPart2066666.Nn6gdluul0";
  protocol="application/pgp-signature";
  micalg=pgp-sha1
Content-Transfer-Encoding: 7bit
Message-Id: <200503010045.18791.dirk@kde.org.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

--nextPart2066666.Nn6gdluul0
Content-Type: text/plain;
  charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

KDE Security Advisory: kppp Privileged fd Leak Vulnerability
Original Release Date: 2005-02-28
URL: http://www.kde.org/info/security/advisory-20050228-1.txt

0. References

        http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2005-0205
       =20
http://www.idefense.com/application/poi/display?id=3D208&type=3Dvulnerabili=
ties


1. Systems affected:

        kppp as included in KDE up to including KDE 3.1.5. KDE 3.2.x
        and newer are not affected.


2. Overview:

        kppp, if installed suid root, allows local attackers to hijack
        a system's domain name resolution function.=20

        A fix introduced for a similiar vulnerability, added to the code
        base in 1998, was incomplete and can be bypassed.

        In 2002 a proper fix was made by Dirk Mueller for KDE 3.2 as part
        of a code audit. No advisory was issued because the problem was
        considered to be unexploitable at that time. iDEFENSE now
        rediscovered the issue and supplied an example exploit for this
        vulnerability.


3. Impact:

        Modifications to /etc/hosts and /etc/resolv.conf can be done by
        local users which allows manipulation of host and domain name
        lookups, enabling other phishing and social engineering attacks.


4. Solution:

        Source code patches have been made available which fix these
        vulnerabilities. Contact your OS vendor / binary package provider
        for information about how to obtain updated binary packages.


5. Patch:

        A patch for KDE 3.1 is available from=20

        ftp://ftp.kde.org/pub/kde/security_patches :

        0e999df54963edd5f565b6d541f408d9  post-3.1.5-kdenetwork.diff


6. Time line and credits:

        09/02/2005 Notification of kppp maintainer by iDEFENSE, Inc.
        09/02/2005 Notification of KDE Security by Harri Porten
        28/02/2005 Coordinated Public Disclosure


--nextPart2066666.Nn6gdluul0
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQBCI60OvsXr+iuy1UoRAvcpAJ9Fk8lc19OEAESo/oXVSVna+UGQlACg60UJ
G32Mj9Vhh2Olq9z2ehvsr5I=
=I9Gp
-----END PGP SIGNATURE-----

--nextPart2066666.Nn6gdluul0--


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру