Vulnerabilities > CVE-2008-1671 - Configuration vulnerability in KDE
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
start_kdeinit in KDE 3.5.5 through 3.5.9, when installed setuid root, allows local users to cause a denial of service and possibly execute arbitrary code via "user-influenceable input" (probably command-line arguments) that cause start_kdeinit to send SIGUSR1 signals to other processes.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 5 |
Common Weakness Enumeration (CWE)
Nessus
NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-608-1.NASL description It was discovered that start_kdeinit in KDE 3 did not properly sanitize its input. A local attacker could exploit this to send signals to other processes and cause a denial of service or possibly execute arbitrary code. (CVE-2008-1671). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 32188 published 2008-05-09 reporter Ubuntu Security Notice (C) 2008-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/32188 title Ubuntu 7.04 / 7.10 / 8.04 LTS : kdelibs vulnerability (USN-608-1) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Ubuntu Security Notice USN-608-1. The text # itself is copyright (C) Canonical, Inc. See # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered # trademark of Canonical, Inc. # include("compat.inc"); if (description) { script_id(32188); script_version("1.14"); script_cvs_date("Date: 2019/08/02 13:33:02"); script_cve_id("CVE-2008-1671"); script_xref(name:"USN", value:"608-1"); script_name(english:"Ubuntu 7.04 / 7.10 / 8.04 LTS : kdelibs vulnerability (USN-608-1)"); script_summary(english:"Checks dpkg output for updated packages."); script_set_attribute( attribute:"synopsis", value: "The remote Ubuntu host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "It was discovered that start_kdeinit in KDE 3 did not properly sanitize its input. A local attacker could exploit this to send signals to other processes and cause a denial of service or possibly execute arbitrary code. (CVE-2008-1671). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://usn.ubuntu.com/608-1/" ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P"); script_cwe_id(16); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:kdelibs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:kdelibs-data"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:kdelibs-dbg"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:kdelibs4-dev"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:kdelibs4-doc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:kdelibs4c2a"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:7.04"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:7.10"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:8.04:-:lts"); script_set_attribute(attribute:"patch_publication_date", value:"2008/05/06"); script_set_attribute(attribute:"plugin_publication_date", value:"2008/05/09"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"Ubuntu Security Notice (C) 2008-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Ubuntu Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("ubuntu.inc"); include("misc_func.inc"); if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/Ubuntu/release"); if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu"); release = chomp(release); if (! ereg(pattern:"^(7\.04|7\.10|8\.04)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 7.04 / 7.10 / 8.04", "Ubuntu " + release); if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu); flag = 0; if (ubuntu_check(osver:"7.04", pkgname:"kdelibs", pkgver:"3.5.6-0ubuntu14.3")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"kdelibs-data", pkgver:"3.5.6-0ubuntu14.3")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"kdelibs-dbg", pkgver:"3.5.6-0ubuntu14.3")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"kdelibs4-dev", pkgver:"3.5.6-0ubuntu14.3")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"kdelibs4-doc", pkgver:"3.5.6-0ubuntu14.3")) flag++; if (ubuntu_check(osver:"7.04", pkgname:"kdelibs4c2a", pkgver:"4:3.5.6-0ubuntu14.3")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"kdelibs", pkgver:"3.5.8-0ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"kdelibs-data", pkgver:"3.5.8-0ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"kdelibs-dbg", pkgver:"3.5.8-0ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"kdelibs4-dev", pkgver:"3.5.8-0ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"kdelibs4-doc", pkgver:"3.5.8-0ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"kdelibs4c2a", pkgver:"4:3.5.8-0ubuntu3.4")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"kdelibs", pkgver:"3.5.9-0ubuntu7.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"kdelibs-data", pkgver:"3.5.9-0ubuntu7.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"kdelibs-dbg", pkgver:"3.5.9-0ubuntu7.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"kdelibs4-dev", pkgver:"3.5.9-0ubuntu7.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"kdelibs4-doc", pkgver:"3.5.9-0ubuntu7.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"kdelibs4c2a", pkgver:"4:3.5.9-0ubuntu7.1")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : ubuntu_report_get() ); exit(0); } else { tested = ubuntu_pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "kdelibs / kdelibs-data / kdelibs-dbg / kdelibs4-dev / kdelibs4-doc / etc"); }
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200804-30.NASL description The remote host is affected by the vulnerability described in GLSA-200804-30 (KDE start_kdeinit: Multiple vulnerabilities) Vulnerabilities have been reported in the processing of user-controlled data by start_kdeinit, which is setuid root by default. Impact : A local attacker could possibly execute arbitrary code with root privileges, cause a Denial of Service or send Unix signals to other processes, when start_kdeinit is setuid root. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 32111 published 2008-05-01 reporter This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/32111 title GLSA-200804-30 : KDE start_kdeinit: Multiple vulnerabilities code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 200804-30. # # The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(32111); script_version("1.12"); script_cvs_date("Date: 2019/08/02 13:32:44"); script_cve_id("CVE-2008-1671"); script_xref(name:"GLSA", value:"200804-30"); script_name(english:"GLSA-200804-30 : KDE start_kdeinit: Multiple vulnerabilities"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-200804-30 (KDE start_kdeinit: Multiple vulnerabilities) Vulnerabilities have been reported in the processing of user-controlled data by start_kdeinit, which is setuid root by default. Impact : A local attacker could possibly execute arbitrary code with root privileges, cause a Denial of Service or send Unix signals to other processes, when start_kdeinit is setuid root. Workaround : There is no known workaround at this time." ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/200804-30" ); script_set_attribute( attribute:"solution", value: "All kdelibs users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '>=kde-base/kdelibs-3.5.8-r4'" ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P"); script_cwe_id(16); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:kdelibs"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"patch_publication_date", value:"2008/04/29"); script_set_attribute(attribute:"plugin_publication_date", value:"2008/05/01"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2008-2019 Tenable Network Security, Inc."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"kde-base/kdelibs", unaffected:make_list("rge 3.5.8-r4", "rge 3.5.9-r3", "gt 4.0", "lt 3.5.5", "rge 3.5.10-r2"), vulnerable:make_list("lt 4.0"))) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get()); else security_warning(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "KDE start_kdeinit"); }
NASL family SuSE Local Security Checks NASL id SUSE_KDELIBS3-5223.NASL description Start_kdeinit did not handle unix signals the right way (CVE-2008-1671) last seen 2020-06-01 modified 2020-06-02 plugin id 32179 published 2008-05-09 reporter This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/32179 title openSUSE 10 Security Update : kdelibs3 (kdelibs3-5223) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from openSUSE Security Update kdelibs3-5223. # # The text description of this plugin is (C) SUSE LLC. # include("compat.inc"); if (description) { script_id(32179); script_version ("1.8"); script_cvs_date("Date: 2019/10/25 13:36:32"); script_cve_id("CVE-2008-1671"); script_name(english:"openSUSE 10 Security Update : kdelibs3 (kdelibs3-5223)"); script_summary(english:"Check for the kdelibs3-5223 patch"); script_set_attribute( attribute:"synopsis", value:"The remote openSUSE host is missing a security update." ); script_set_attribute( attribute:"description", value: "Start_kdeinit did not handle unix signals the right way (CVE-2008-1671)" ); script_set_attribute( attribute:"solution", value:"Update the affected kdelibs3 packages." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P"); script_cwe_id(16); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kdelibs3"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kdelibs3-32bit"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kdelibs3-arts"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kdelibs3-arts-32bit"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kdelibs3-default-style"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kdelibs3-default-style-32bit"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kdelibs3-devel"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:10.3"); script_set_attribute(attribute:"patch_publication_date", value:"2008/04/28"); script_set_attribute(attribute:"plugin_publication_date", value:"2008/05/09"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2008-2019 Tenable Network Security, Inc."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE"); if (release !~ "^(SUSE10\.3)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "10.3", release); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); ourarch = get_kb_item("Host/cpu"); if (!ourarch) audit(AUDIT_UNKNOWN_ARCH); if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch); flag = 0; if ( rpm_check(release:"SUSE10.3", reference:"kdelibs3-3.5.7-72.9") ) flag++; if ( rpm_check(release:"SUSE10.3", reference:"kdelibs3-arts-3.5.7-72.9") ) flag++; if ( rpm_check(release:"SUSE10.3", reference:"kdelibs3-default-style-3.5.7-72.9") ) flag++; if ( rpm_check(release:"SUSE10.3", reference:"kdelibs3-devel-3.5.7-72.9") ) flag++; if ( rpm_check(release:"SUSE10.3", cpu:"x86_64", reference:"kdelibs3-32bit-3.5.7-72.9") ) flag++; if ( rpm_check(release:"SUSE10.3", cpu:"x86_64", reference:"kdelibs3-arts-32bit-3.5.7-72.9") ) flag++; if ( rpm_check(release:"SUSE10.3", cpu:"x86_64", reference:"kdelibs3-default-style-32bit-3.5.7-72.9") ) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "kdelibs3"); }
NASL family Mandriva Local Security Checks NASL id MANDRIVA_MDVSA-2008-097.NASL description A vulnerability was found in start_kdeinit in KDE 3.5.5 through 3.5.9 where, if it was installed setuid root, it could allow local users to cause a denial of service or possibly execute arbitrary code (CVE-2008-1671). By default, start_kdeinit is not installed setuid root on Mandriva Linux, however updated packages have been patched to correct this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 36729 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/36729 title Mandriva Linux Security Advisory : kdelibs (MDVSA-2008:097) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Mandriva Linux Security Advisory MDVSA-2008:097. # The text itself is copyright (C) Mandriva S.A. # include("compat.inc"); if (description) { script_id(36729); script_version ("1.12"); script_cvs_date("Date: 2019/08/02 13:32:50"); script_cve_id("CVE-2008-1671"); script_xref(name:"MDVSA", value:"2008:097"); script_name(english:"Mandriva Linux Security Advisory : kdelibs (MDVSA-2008:097)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value: "The remote Mandriva Linux host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "A vulnerability was found in start_kdeinit in KDE 3.5.5 through 3.5.9 where, if it was installed setuid root, it could allow local users to cause a denial of service or possibly execute arbitrary code (CVE-2008-1671). By default, start_kdeinit is not installed setuid root on Mandriva Linux, however updated packages have been patched to correct this issue." ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P"); script_cwe_id(16); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:kdelibs-common"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:kdelibs-devel-doc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64kdecore4"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64kdecore4-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libkdecore4"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libkdecore4-devel"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2008.0"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2008.1"); script_set_attribute(attribute:"patch_publication_date", value:"2008/05/06"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/04/23"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc."); script_family(english:"Mandriva Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux"); if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu); flag = 0; if (rpm_check(release:"MDK2008.0", reference:"kdelibs-common-3.5.7-43.8mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"kdelibs-devel-doc-3.5.7-43.8mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", cpu:"x86_64", reference:"lib64kdecore4-3.5.7-43.8mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", cpu:"x86_64", reference:"lib64kdecore4-devel-3.5.7-43.8mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", cpu:"i386", reference:"libkdecore4-3.5.7-43.8mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", cpu:"i386", reference:"libkdecore4-devel-3.5.7-43.8mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"kdelibs-common-3.5.9-10.1mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"kdelibs-devel-doc-3.5.9-10.1mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", cpu:"x86_64", reference:"lib64kdecore4-3.5.9-10.1mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", cpu:"x86_64", reference:"lib64kdecore4-devel-3.5.9-10.1mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", cpu:"i386", reference:"libkdecore4-3.5.9-10.1mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", cpu:"i386", reference:"libkdecore4-devel-3.5.9-10.1mdv2008.1", yank:"mdv")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Slackware Local Security Checks NASL id SLACKWARE_SSA_2008-116-01.NASL description New kdelibs packages are available for Slackware 12.0 and -current to fix a security issue. last seen 2020-06-01 modified 2020-06-02 plugin id 32056 published 2008-04-28 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/32056 title Slackware 12.0 / current : kdelibs (SSA:2008-116-01) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Slackware Security Advisory 2008-116-01. The text # itself is copyright (C) Slackware Linux, Inc. # include("compat.inc"); if (description) { script_id(32056); script_version("1.14"); script_cvs_date("Date: 2019/10/25 13:36:21"); script_cve_id("CVE-2008-1671"); script_xref(name:"SSA", value:"2008-116-01"); script_name(english:"Slackware 12.0 / current : kdelibs (SSA:2008-116-01)"); script_summary(english:"Checks for updated package in /var/log/packages"); script_set_attribute( attribute:"synopsis", value:"The remote Slackware host is missing a security update." ); script_set_attribute( attribute:"description", value: "New kdelibs packages are available for Slackware 12.0 and -current to fix a security issue." ); # http://www.kde.org/info/security/advisory-20080426-2.txt script_set_attribute( attribute:"see_also", value:"https://www.kde.org/info/security/advisory-20080426-2.txt" ); # http://www.slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.375422 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?db5f8e8b" ); script_set_attribute( attribute:"solution", value:"Update the affected kdelibs package." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P"); script_cwe_id(16); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:slackware:slackware_linux:kdelibs"); script_set_attribute(attribute:"cpe", value:"cpe:/o:slackware:slackware_linux"); script_set_attribute(attribute:"cpe", value:"cpe:/o:slackware:slackware_linux:12.0"); script_set_attribute(attribute:"patch_publication_date", value:"2008/04/26"); script_set_attribute(attribute:"plugin_publication_date", value:"2008/04/28"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Slackware Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Slackware/release", "Host/Slackware/packages"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("slackware.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Slackware/release")) audit(AUDIT_OS_NOT, "Slackware"); if (!get_kb_item("Host/Slackware/packages")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Slackware", cpu); flag = 0; if (slackware_check(osver:"12.0", pkgname:"kdelibs", pkgver:"3.5.7", pkgarch:"i486", pkgnum:"4_slack12.0")) flag++; if (slackware_check(osver:"current", pkgname:"kdelibs", pkgver:"3.5.9", pkgarch:"i486", pkgnum:"4")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:slackware_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 28938 CVE(CAN) ID: CVE-2008-1671 KDE是一个为UNIX工作站设计的强大的开源图形桌面环境。 start_kdeinit是KDE使用的用于启动kdeinit的封装程序,默认下start_kdeinit是以setuid root安装的,这允许本地用户向其他进程发送Unix信号,导致拒绝服务或执行任意指令。 KDE 3.5.5 - 3.5.9 KDE --- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: <a href=ftp://ftp.kde.org/pub/kde/security_patches/post-kde-3.5.5-kinit.diff target=_blank>ftp://ftp.kde.org/pub/kde/security_patches/post-kde-3.5.5-kinit.diff</a> |
id | SSV:3231 |
last seen | 2017-11-19 |
modified | 2008-04-29 |
published | 2008-04-29 |
reporter | Root |
title | KDE start_kdeinit本地权限提升漏洞 |
Statements
contributor | Joshua Bressers |
lastmodified | 2008-05-01 |
organization | Red Hat |
statement | Not vulnerable. This issue did not affect versions of KDE as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5. |
References
- ftp://ftp.kde.org/pub/kde/security_patches/post-kde-3.5.5-kinit.diff
- http://www.kde.org/info/security/advisory-20080426-2.txt
- http://www.securityfocus.com/bid/28938
- http://www.securitytracker.com/id?1019924
- http://secunia.com/advisories/29951
- http://security.gentoo.org/glsa/glsa-200804-30.xml
- http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html
- http://secunia.com/advisories/29977
- http://secunia.com/advisories/30113
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:097
- http://www.ubuntu.com/usn/usn-608-1
- http://www.vupen.com/english/advisories/2008/1370/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42039