Vulnerability Note VU#32448

Due to insecure creation of configuration files via KApplication-class, local users can create arbitrary files when running setuid root KDE programs

Original Release date: 30 May 2001 | Last revised: 30 May 2001


KApplication-class, a class used to create KDE applications, creates configuration files without checking for proper ownership or prior existence.


KApplication-class, a class used to create KDE applications, creates configuration files. These files are created in a local directory and named predictably based on the KDE application name. The CREAT call does not check for prior existence or proper ownership.


Using a symlink attack, an attacker my cause corruption of any file writable by the user of the application. If the application is setuid root, an attacker may cause corruption of any file in the system.


Contact vendor for patches.

The system administrator could create configuration files for common applications, appropriately named and protected, to forestall the symlink attack, but this would not be a robust fix and may need to be reapplied frequently.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
RedHatAffected05 Jun 200029 May 2001
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



The initial report of this vulnerability was made by Sebastian Krahmer.

This document was last modified by Tim Shimeall.

Other Information

  • CVE IDs: CVE-2000-0530
  • Date Public: 29 May 2000
  • Date First Published: 30 May 2001
  • Date Last Updated: 30 May 2001
  • Severity Metric: 3.79
  • Document Revision: 9


If you have feedback, comments, or additional information about this vulnerability, please send us email.