Vulnerabilities > CVE-2005-2494 - Unspecified vulnerability in KDE

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
kde
nessus

Summary

kcheckpass in KDE 3.2.0 up to 3.4.2 allows local users to gain root access via a symlink attack on lock files.

Nessus

  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2005-251-01.NASL
    descriptionNew kdebase packages are available for Slackware 10.0, 10.1, and -current to fix a security issue with the kcheckpass program. Earlier versions of Slackware are not affected. A flaw in the way the program creates lockfiles could allow a local attacker to gain root privileges.
    last seen2020-06-01
    modified2020-06-02
    plugin id19861
    published2005-10-05
    reporterThis script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/19861
    titleSlackware 10.0 / 10.1 / current : kcheckpass in kdebase (SSA:2005-251-01)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Slackware Security Advisory 2005-251-01. The text 
    # itself is copyright (C) Slackware Linux, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(19861);
      script_version("1.16");
      script_cvs_date("Date: 2019/10/25 13:36:20");
    
      script_cve_id("CVE-2005-2494");
      script_xref(name:"SSA", value:"2005-251-01");
    
      script_name(english:"Slackware 10.0 / 10.1 / current : kcheckpass in kdebase (SSA:2005-251-01)");
      script_summary(english:"Checks for updated package in /var/log/packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Slackware host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "New kdebase packages are available for Slackware 10.0, 10.1, and
    -current to fix a security issue with the kcheckpass program. Earlier
    versions of Slackware are not affected. A flaw in the way the program
    creates lockfiles could allow a local attacker to gain root
    privileges."
      );
      # http://www.kde.org/info/security/advisory-20050905-1.txt
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.kde.org/info/security/advisory-20050905-1.txt"
      );
      # http://www.slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.367371
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?700a2028"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected kdebase package."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:slackware:slackware_linux:kdebase");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:slackware:slackware_linux");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:slackware:slackware_linux:10.0");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:slackware:slackware_linux:10.1");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2005/09/08");
      script_set_attribute(attribute:"plugin_publication_date", value:"2005/10/05");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Slackware Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Slackware/release", "Host/Slackware/packages");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("slackware.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Slackware/release")) audit(AUDIT_OS_NOT, "Slackware");
    if (!get_kb_item("Host/Slackware/packages")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Slackware", cpu);
    
    
    flag = 0;
    if (slackware_check(osver:"10.0", pkgname:"kdebase", pkgver:"3.2.3", pkgarch:"i486", pkgnum:"3")) flag++;
    
    if (slackware_check(osver:"10.1", pkgname:"kdebase", pkgver:"3.3.2", pkgarch:"i486", pkgnum:"2")) flag++;
    
    if (slackware_check(osver:"current", pkgname:"kdebase", pkgver:"3.4.2", pkgarch:"i486", pkgnum:"2")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:slackware_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-815.NASL
    descriptionIlja van Sprundel discovered a serious lock file handling error in kcheckpass that can, in some configurations, be used to gain root access.
    last seen2020-06-01
    modified2020-06-02
    plugin id19711
    published2005-09-17
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19711
    titleDebian DSA-815-1 : kdebase - programming error
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-176-1.NASL
    descriptionIlja van Sprundel discovered a flaw in the lock file handling of kcheckpass. A local attacker could exploit this to execute arbitrary code with root privileges. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id20586
    published2006-01-15
    reporterUbuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20586
    titleUbuntu 5.04 : kdebase vulnerability (USN-176-1)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2006-0582.NASL
    descriptionUpdated kdebase packages that resolve several bugs are now available. This update has been rated as having low security impact by the Red Hat Security Response Team. The kdebase packages provide the core applications for KDE, the K Desktop Environment. These core packages include the file manager Konqueror. Ilja van Sprundel discovered a lock file handling flaw in kcheckpass. If the directory /var/lock is writable by a user who is allowed to run kcheckpass, that user could gain root privileges. In Red Hat Enterprise Linux, the /var/lock directory is not writable by users and therefore this flaw could only have been exploited if the permissions on that directory have been badly configured. A patch to block this issue has been included in this update. (CVE-2005-2494) The following bugs have also been addressed : - kstart --tosystray does not send the window to the system tray in Kicker - When the customer enters or selects URLs in Firefox
    last seen2020-06-01
    modified2020-06-02
    plugin id22222
    published2006-08-14
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/22222
    titleRHEL 4 : kdebase (RHSA-2006:0582)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2005-160.NASL
    descriptionIlja van Sprundel from suresec.org notified the KDE security team about a serious lock file handling error in kcheckpass that can, in some configurations, be used to gain root access. In order for an exploit to succeed, the directory /var/lock has to be writeable for a user that is allowed to invoke kcheckpass. The updated packages have been patched to correct this problem.
    last seen2020-06-01
    modified2020-06-02
    plugin id19915
    published2005-10-05
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19915
    titleMandrake Linux Security Advisory : kdebase (MDKSA-2005:160)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2006-0582.NASL
    descriptionUpdated kdebase packages that resolve several bugs are now available. This update has been rated as having low security impact by the Red Hat Security Response Team. The kdebase packages provide the core applications for KDE, the K Desktop Environment. These core packages include the file manager Konqueror. Ilja van Sprundel discovered a lock file handling flaw in kcheckpass. If the directory /var/lock is writable by a user who is allowed to run kcheckpass, that user could gain root privileges. In Red Hat Enterprise Linux, the /var/lock directory is not writable by users and therefore this flaw could only have been exploited if the permissions on that directory have been badly configured. A patch to block this issue has been included in this update. (CVE-2005-2494) The following bugs have also been addressed : - kstart --tosystray does not send the window to the system tray in Kicker - When the customer enters or selects URLs in Firefox
    last seen2020-06-01
    modified2020-06-02
    plugin id22277
    published2006-08-30
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/22277
    titleCentOS 4 : kdebase (CESA-2006:0582)

Oval

accepted2013-04-29T04:19:07.188-04:00
classvulnerability
contributors
  • nameAharon Chernin
    organizationSCAP.com, LLC
  • nameDragos Prisaca
    organizationG2, Inc.
definition_extensions
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
    ovaloval:org.mitre.oval:def:11831
  • commentCentOS Linux 4.x
    ovaloval:org.mitre.oval:def:16636
  • commentOracle Linux 4.x
    ovaloval:org.mitre.oval:def:15990
descriptionkcheckpass in KDE 3.2.0 up to 3.4.2 allows local users to gain root access via a symlink attack on lock files.
familyunix
idoval:org.mitre.oval:def:9388
statusaccepted
submitted2010-07-09T03:56:16-04:00
titlekcheckpass in KDE 3.2.0 up to 3.4.2 allows local users to gain root access via a symlink attack on lock files.
version26

Redhat

advisories
bugzilla
id166995
titleCVE-2005-2494 kcheckpass privilege escalation
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 4 is installed
      ovaloval:com.redhat.rhba:tst:20070304025
    • OR
      • AND
        • commentkdebase is earlier than 6:3.3.1-5.13
          ovaloval:com.redhat.rhsa:tst:20060582001
        • commentkdebase is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20060548002
      • AND
        • commentkdebase-devel is earlier than 6:3.3.1-5.13
          ovaloval:com.redhat.rhsa:tst:20060582003
        • commentkdebase-devel is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20060548004
rhsa
idRHSA-2006:0582
released2006-08-10
severityLow
titleRHSA-2006:0582: kdebase security fix (Low)
rpms
  • kdebase-6:3.3.1-5.13
  • kdebase-debuginfo-6:3.3.1-5.13
  • kdebase-devel-6:3.3.1-5.13