CVE-2006-2449

KDE Display Manager (KDM) in KDE 3.2.0 up to 3.5.3 allows local users to read arbitrary files via a symlink attack related to the session type for login.
References
Link Resource
http://secunia.com/advisories/20602 Vendor Advisory
http://secunia.com/advisories/20660 Vendor Advisory
http://secunia.com/advisories/20674 Vendor Advisory
http://secunia.com/advisories/20702 Vendor Advisory
http://secunia.com/advisories/20785 Vendor Advisory
http://secunia.com/advisories/20869 Vendor Advisory
http://secunia.com/advisories/20890 Vendor Advisory
http://secunia.com/advisories/21662 Vendor Advisory
http://securitytracker.com/id?1016297
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.444467
http://www.debian.org/security/2006/dsa-1156 Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200606-23.xml
http://www.kde.org/info/security/advisory-20060614-1.txt Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:105
http://www.mandriva.com/security/advisories?name=MDKSA-2006:106
http://www.novell.com/linux/security/advisories/2006_39_kdm.html Vendor Advisory
http://www.osvdb.org/26511
http://www.redhat.com/support/errata/RHSA-2006-0548.html Patch Vendor Advisory
http://www.securityfocus.com/archive/1/437133/100/0/threaded
http://www.securityfocus.com/archive/1/437322/100/0/threaded
http://www.securityfocus.com/bid/18431
http://www.vupen.com/english/advisories/2006/2355
https://exchange.xforce.ibmcloud.com/vulnerabilities/27181
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9844
https://usn.ubuntu.com/301-1/
http://secunia.com/advisories/20602 Vendor Advisory
http://secunia.com/advisories/20660 Vendor Advisory
http://secunia.com/advisories/20674 Vendor Advisory
http://secunia.com/advisories/20702 Vendor Advisory
http://secunia.com/advisories/20785 Vendor Advisory
http://secunia.com/advisories/20869 Vendor Advisory
http://secunia.com/advisories/20890 Vendor Advisory
http://secunia.com/advisories/21662 Vendor Advisory
http://securitytracker.com/id?1016297
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.444467
http://www.debian.org/security/2006/dsa-1156 Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200606-23.xml
http://www.kde.org/info/security/advisory-20060614-1.txt Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:105
http://www.mandriva.com/security/advisories?name=MDKSA-2006:106
http://www.novell.com/linux/security/advisories/2006_39_kdm.html Vendor Advisory
http://www.osvdb.org/26511
http://www.redhat.com/support/errata/RHSA-2006-0548.html Patch Vendor Advisory
http://www.securityfocus.com/archive/1/437133/100/0/threaded
http://www.securityfocus.com/archive/1/437322/100/0/threaded
http://www.securityfocus.com/bid/18431
http://www.vupen.com/english/advisories/2006/2355
https://exchange.xforce.ibmcloud.com/vulnerabilities/27181
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9844
https://usn.ubuntu.com/301-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.4:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.4.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.4.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.4.3:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.5:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.5.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.5.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:11

Type Values Removed Values Added
References () http://secunia.com/advisories/20602 - Vendor Advisory () http://secunia.com/advisories/20602 - Vendor Advisory
References () http://secunia.com/advisories/20660 - Vendor Advisory () http://secunia.com/advisories/20660 - Vendor Advisory
References () http://secunia.com/advisories/20674 - Vendor Advisory () http://secunia.com/advisories/20674 - Vendor Advisory
References () http://secunia.com/advisories/20702 - Vendor Advisory () http://secunia.com/advisories/20702 - Vendor Advisory
References () http://secunia.com/advisories/20785 - Vendor Advisory () http://secunia.com/advisories/20785 - Vendor Advisory
References () http://secunia.com/advisories/20869 - Vendor Advisory () http://secunia.com/advisories/20869 - Vendor Advisory
References () http://secunia.com/advisories/20890 - Vendor Advisory () http://secunia.com/advisories/20890 - Vendor Advisory
References () http://secunia.com/advisories/21662 - Vendor Advisory () http://secunia.com/advisories/21662 - Vendor Advisory
References () http://securitytracker.com/id?1016297 - () http://securitytracker.com/id?1016297 -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.444467 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.444467 -
References () http://www.debian.org/security/2006/dsa-1156 - Vendor Advisory () http://www.debian.org/security/2006/dsa-1156 - Vendor Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200606-23.xml - () http://www.gentoo.org/security/en/glsa/glsa-200606-23.xml -
References () http://www.kde.org/info/security/advisory-20060614-1.txt - Vendor Advisory () http://www.kde.org/info/security/advisory-20060614-1.txt - Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:105 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:105 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:106 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:106 -
References () http://www.novell.com/linux/security/advisories/2006_39_kdm.html - Vendor Advisory () http://www.novell.com/linux/security/advisories/2006_39_kdm.html - Vendor Advisory
References () http://www.osvdb.org/26511 - () http://www.osvdb.org/26511 -
References () http://www.redhat.com/support/errata/RHSA-2006-0548.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2006-0548.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/437133/100/0/threaded - () http://www.securityfocus.com/archive/1/437133/100/0/threaded -
References () http://www.securityfocus.com/archive/1/437322/100/0/threaded - () http://www.securityfocus.com/archive/1/437322/100/0/threaded -
References () http://www.securityfocus.com/bid/18431 - () http://www.securityfocus.com/bid/18431 -
References () http://www.vupen.com/english/advisories/2006/2355 - () http://www.vupen.com/english/advisories/2006/2355 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27181 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27181 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9844 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9844 -
References () https://usn.ubuntu.com/301-1/ - () https://usn.ubuntu.com/301-1/ -

Information

Published : 2006-06-15 10:02

Updated : 2024-11-21 00:11


NVD link : CVE-2006-2449

Mitre link : CVE-2006-2449

CVE.ORG link : CVE-2006-2449


JSON object : View

Products Affected

kde

  • kde