Vulnerability Note VU#32448
Due to insecure creation of configuration files via KApplication-class, local users can create arbitrary files when running setuid root KDE programs
KApplication-class, a class used to create KDE applications, creates configuration files without checking for proper ownership or prior existence.
KApplication-class, a class used to create KDE applications, creates configuration files. These files are created in a local directory and named predictably based on the KDE application name. The CREAT call does not check for prior existence or proper ownership.
Using a symlink attack, an attacker my cause corruption of any file writable by the user of the application. If the application is setuid root, an attacker may cause corruption of any file in the system.
Contact vendor for patches.
The system administrator could create configuration files for common applications, appropriately named and protected, to forestall the symlink attack, but this would not be a robust fix and may need to be reapplied frequently.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|RedHat||Affected||05 Jun 2000||29 May 2001|
CVSS Metrics (Learn More)
The initial report of this vulnerability was made by Sebastian Krahmer.
This document was last modified by Tim Shimeall.
- CVE IDs: CVE-2000-0530
- Date Public: 29 May 2000
- Date First Published: 30 May 2001
- Date Last Updated: 30 May 2001
- Severity Metric: 3.79
- Document Revision: 9
If you have feedback, comments, or additional information about this vulnerability, please send us email.