Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.50745
Category:Mandrake Local Security Checks
Title:Mandrake Security Advisory MDKSA-2003:091 (kdebase)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to kdebase
announced via advisory MDKSA-2003:091.

A vulnerability was discovered in all versions of KDE 2.2.0 up to and
including 3.1.3. KDM does not check for successful completion of the
pam_setcred() call and in the case of error conditions in the installed
PAM modules, KDM may grant local root access to any user with valid
login credentials. It has been reported to the KDE team that a certain
configuration of the MIT pam_krb5 module can result in a failing
pam_setcred() call which leaves the session alive and would provide root
access to any regular user. It is also possible that this vulnerability
can likewise be exploited with other PAM modules in a similar manner.

Another vulnerability was discovered in kdm where the cookie session
generating algorithm was considered too weak to supply a full 128 bits
of entropy. This allowed unauthorized users to brute-force the session
cookie.

mdkkdm, a specialized version of kdm, is likewise vulnerable to these
problems and has been patched as well.

Affected versions: 9.0, 9.1, Corporate Server 2.1

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDKSA-2003:091
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0690
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0692
http://www.kde.org/info/security/advisory-20030916-1.txt
http://cert.uni-stuttgart.de/archive/suse/security/2002/12/msg00101.html

Risk factor : Critical

CVSS Score:
10.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2003-0690
Bugtraq: 20030916 [KDE SECURITY ADVISORY] KDM vulnerabilities (Google Search)
http://marc.info/?l=bugtraq&m=106374551513499&w=2
Conectiva Linux advisory: CLA-2003:747
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000747
Debian Security Information: DSA-388 (Google Search)
http://www.debian.org/security/2003/dsa-388
Debian Security Information: DSA-443 (Google Search)
http://www.debian.org/security/2004/dsa-443
http://www.mandriva.com/security/advisories?name=MDKSA-2003:091
http://cert.uni-stuttgart.de/archive/suse/security/2002/12/msg00101.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A193
http://www.redhat.com/support/errata/RHSA-2003-270.html
http://www.redhat.com/support/errata/RHSA-2003-286.html
http://www.redhat.com/support/errata/RHSA-2003-287.html
http://www.redhat.com/support/errata/RHSA-2003-288.html
http://www.redhat.com/support/errata/RHSA-2003-289.html
Common Vulnerability Exposure (CVE) ID: CVE-2003-0692
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A215
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.