kinit in KDE Frameworks before 5.23.0 uses weak permissions (644) for /tmp/xauth-xxx-_y, which allows local users to obtain X11 cookies of other users and consequently capture keystrokes and possibly gain privileges by reading the file.
References
Configurations
History
21 Nov 2024, 02:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-updates/2016-07/msg00001.html - | |
References | () http://www.kde.com/announcements/kde-frameworks-5.23.0.php - | |
References | () http://www.securityfocus.com/bid/91769 - | |
References | () https://bugs.kde.org/show_bug.cgi?id=358593 - | |
References | () https://bugs.kde.org/show_bug.cgi?id=363140 - | |
References | () https://quickgit.kde.org/?p=kinit.git&a=commitdiff&h=72f3702dbe6cf15c06dc13da2c99c864e9022a58 - | |
References | () https://quickgit.kde.org/?p=kinit.git&a=commitdiff&h=dece8fd89979cd1a86c03bcaceef6e9221e8d8cd - | |
References | () https://www.kde.org/info/security/advisory-20160621-1.txt - |
Information
Published : 2016-07-13 15:59
Updated : 2024-11-21 02:49
NVD link : CVE-2016-3100
Mitre link : CVE-2016-3100
CVE.ORG link : CVE-2016-3100
JSON object : View
Products Affected
opensuse
- leap
- opensuse
kde
- kde_frameworks
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor