CVE-2005-2494

kcheckpass in KDE 3.2.0 up to 3.4.2 allows local users to gain root access via a symlink attack on lock files.
References
Link Resource
ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.2-kdebase-kcheckpass.diff Patch
http://marc.info/?l=bugtraq&m=112603999215453&w=2
http://marc.info/?l=bugtraq&m=112611555928169&w=2
http://secunia.com/advisories/16692
http://secunia.com/advisories/18139
http://secunia.com/advisories/21481
http://www.debian.org/security/2005/dsa-815
http://www.kde.org/info/security/advisory-20050905-1.txt Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:160
http://www.redhat.com/support/errata/RHSA-2006-0582.html
http://www.securityfocus.com/bid/14736
http://www.suresec.org/advisories/adv6.pdf
http://www.ubuntu.com/usn/usn-176-1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9388
ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.2-kdebase-kcheckpass.diff Patch
http://marc.info/?l=bugtraq&m=112603999215453&w=2
http://marc.info/?l=bugtraq&m=112611555928169&w=2
http://secunia.com/advisories/16692
http://secunia.com/advisories/18139
http://secunia.com/advisories/21481
http://www.debian.org/security/2005/dsa-815
http://www.kde.org/info/security/advisory-20050905-1.txt Patch Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:160
http://www.redhat.com/support/errata/RHSA-2006-0582.html
http://www.securityfocus.com/bid/14736
http://www.suresec.org/advisories/adv6.pdf
http://www.ubuntu.com/usn/usn-176-1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9388
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:kde:kde:3.2.0:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.3.0:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.4.0:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.4.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.4.2:*:*:*:*:*:*:*

History

20 Nov 2024, 23:59

Type Values Removed Values Added
References () ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.2-kdebase-kcheckpass.diff - Patch () ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.2-kdebase-kcheckpass.diff - Patch
References () http://marc.info/?l=bugtraq&m=112603999215453&w=2 - () http://marc.info/?l=bugtraq&m=112603999215453&w=2 -
References () http://marc.info/?l=bugtraq&m=112611555928169&w=2 - () http://marc.info/?l=bugtraq&m=112611555928169&w=2 -
References () http://secunia.com/advisories/16692 - () http://secunia.com/advisories/16692 -
References () http://secunia.com/advisories/18139 - () http://secunia.com/advisories/18139 -
References () http://secunia.com/advisories/21481 - () http://secunia.com/advisories/21481 -
References () http://www.debian.org/security/2005/dsa-815 - () http://www.debian.org/security/2005/dsa-815 -
References () http://www.kde.org/info/security/advisory-20050905-1.txt - Patch, Vendor Advisory () http://www.kde.org/info/security/advisory-20050905-1.txt - Patch, Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:160 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:160 -
References () http://www.redhat.com/support/errata/RHSA-2006-0582.html - () http://www.redhat.com/support/errata/RHSA-2006-0582.html -
References () http://www.securityfocus.com/bid/14736 - () http://www.securityfocus.com/bid/14736 -
References () http://www.suresec.org/advisories/adv6.pdf - () http://www.suresec.org/advisories/adv6.pdf -
References () http://www.ubuntu.com/usn/usn-176-1 - () http://www.ubuntu.com/usn/usn-176-1 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9388 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9388 -

Information

Published : 2005-09-06 23:03

Updated : 2024-11-20 23:59


NVD link : CVE-2005-2494

Mitre link : CVE-2005-2494

CVE.ORG link : CVE-2005-2494


JSON object : View

Products Affected

kde

  • kde