Vulnerabilities > CVE-2007-5963 - Unspecified vulnerability in KDE
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN kde
nessus
Summary
Unspecified vulnerability in kdebase allows local users to cause a denial of service (KDM login inaccessible, or resource consumption) via unknown vectors.
Nessus
NASL family Fedora Local Security Checks NASL id FEDORA_2008-1283.NASL description The remote Fedora host is missing a security update involving kdebase. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 30161 published 2008-02-05 reporter This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/30161 title Fedora 8 : kdebase-3.5.8-31.fc8 (2008-1283) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory 2008-1283. # include("compat.inc"); if (description) { script_id(30161); script_version ("1.11"); script_cvs_date("Date: 2019/08/02 13:32:27"); script_cve_id("CVE-2007-5963"); script_xref(name:"FEDORA", value:"2008-1283"); script_name(english:"Fedora 8 : kdebase-3.5.8-31.fc8 (2008-1283)"); script_summary(english:"Checks rpm output for the updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing a security update." ); script_set_attribute( attribute:"description", value: "The remote Fedora host is missing a security update involving kdebase. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); # https://lists.fedoraproject.org/pipermail/package-announce/2008-February/007419.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?caece3c2" ); script_set_attribute( attribute:"solution", value:"Update the affected kdebase package." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:N/I:N/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:kdebase"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:8"); script_set_attribute(attribute:"patch_publication_date", value:"2008/02/02"); script_set_attribute(attribute:"plugin_publication_date", value:"2008/02/05"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2008-2019 Tenable Network Security, Inc."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! ereg(pattern:"^8([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 8.x", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC8", reference:"kdebase-3.5.8-31.fc8")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "kdebase"); }
NASL family Fedora Local Security Checks NASL id FEDORA_2008-1264.NASL description The remote Fedora host is missing a security update involving kdebase. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 30160 published 2008-02-05 reporter This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/30160 title Fedora 7 : kdebase-3.5.8-31.fc7 (2008-1264)
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 26909 CVE ID:CVE-2007-5963 CNCVE ID:CNCVE-20075963 rPath Linux是采用新的Conary分布式软件管理系统构造的Linux发行。 rPath Linux KDM存在未明安全问题,本地攻击者可以利用漏洞使其他用户拒绝登录或使KDM消耗大量系统资源而造成拒绝服务攻击。 目前没有详细漏洞细节提供。 rPath kdebase 3.4.2-3.15 厂商解决方案 可联系供应商获得补丁信息: <a href=http://www.securityfocus.com/archive/1/485238 target=_blank>http://www.securityfocus.com/archive/1/485238</a> |
id | SSV:2634 |
last seen | 2017-11-19 |
modified | 2007-12-18 |
published | 2007-12-18 |
reporter | Root |
title | rPath Linux KDM未明本地拒绝服务漏洞 |
Statements
contributor | Mark J Cox |
lastmodified | 2010-03-05 |
organization | Red Hat |
statement | Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5963 The Red Hat Security Response Team has rated this issue as having low security impact, at this time Red Hat does not intend to address this flaw in a future update. |
References
- http://www.securityfocus.com/archive/1/485238
- https://issues.rpath.com/browse/RPL-1992
- http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0268
- http://www.securityfocus.com/bid/26909
- http://secunia.com/advisories/28104
- http://secunia.com/advisories/28181
- http://securityreason.com/securityalert/3469
- http://osvdb.org/41395
- http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00038.html
- http://secunia.com/advisories/28751
- http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00031.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:017
- http://www.vupen.com/english/advisories/2007/4267
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39168