Vulnerabilities > CVE-2003-0549 - Denial-Of-Service vulnerability in Kdebase
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
The X Display Manager Control Protocol (XDMCP) support for GDM before 2.4.1.6 allows attackers to cause a denial of service (daemon crash) via a short authorization key name.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 8 | |
Application | 7 | |
OS | 7 |
Nessus
NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2003-085.NASL description Several vulnerabilities were discovered in versions of gdm prior to 2.4.1.6. The first vulnerability is that any user can read any text file on the system due to code originally written to be run as the user logging in was in fact being run as the root user. This code is what allows the examination of the ~/.xsession-errors file. If a user makes a symlink from this file to any other file on the system during the session and ensures that the session lasts less than ten seconds, the user can read the file provided it was readable as a text file. Another two vulnerabilities were found in the XDMCP code that could be exploited to crash the main gdm daemon which would inhibit starting any new sessions (although the current session would be unaffected). The first problem here is due to the indirect query structure being used right after being freed due to a missing last seen 2020-06-01 modified 2020-06-02 plugin id 14067 published 2004-07-31 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/14067 title Mandrake Linux Security Advisory : gdm (MDKSA-2003:085) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2003-259.NASL description Updated GDM packages are available which correct a local crash if XDMCP is enabled. GDM is the GNOME Display Manager for X. Two bugs have been found in the X Display Manager Control Protocol (XDMCP) which could allow a denial of service attack (DoS) by crashing the gdm daemon. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2003-0548 and CVE-2003-0549 to these issues. This attack is only possible if XDMCP is enabled. XDMCP is not enabled by default in Red Hat Enterprise Linux distributions. In addition is documented best practise that XDMCP should only ever be run on trusted networks. Users of XDMCP in GDM should upgrade to these erratum packages which contain backported security fixes are are not vulnerable to these issues. Note that Red Hat Enterprise Linux 2.1 is not vulnerable to CVE-2003-0547, a vulnerability that allows a local user to read any text file, as it did not have the last seen 2020-06-01 modified 2020-06-02 plugin id 12416 published 2004-07-06 reporter This script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/12416 title RHEL 2.1 : gdm (RHSA-2003:259)
Oval
accepted | 2007-04-25T19:52:15.558-04:00 | ||||||||
class | vulnerability | ||||||||
contributors |
| ||||||||
description | The X Display Manager Control Protocol (XDMCP) support for GDM before 2.4.1.6 allows attackers to cause a denial of service (daemon crash) via a short authorization key name. | ||||||||
family | unix | ||||||||
id | oval:org.mitre.oval:def:129 | ||||||||
status | accepted | ||||||||
submitted | 2003-09-04T12:00:00.000-04:00 | ||||||||
title | GDM X Display Manager Authorization Vulnerability | ||||||||
version | 38 |
Redhat
advisories |
|
References
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000729
- http://mail.gnome.org/archives/gnome-hackers/2003-August/msg00045.html
- http://www.redhat.com/support/errata/RHSA-2003-258.html
- http://www.redhat.com/support/errata/RHSA-2003-259.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A129