search menu icon-carat-right cmu-wordmark

CERT Coordination Center


KDE2 kdesu 'keep password' option does not verify socket listener potentially exposing su password

Vulnerability Note VU#982616

Original Release Date: 2001-05-17 | Last Revised: 2001-08-01

Overview

kdesu is a interactive interface to the substitute user (su) command for the KDE environment. To pass authentication information, it creates a file that may be read by unauthorized users.

Description

kdesu communicates with su using a socket, implemented as a file in /tmp with a predictable name. In this file is placed authenticating information for the effective user that the kdesu user wishes to become (often root).

Impact

By using a symbolic link attack, an attacker may be able to capture usernames and passwords.

Solution

Apply vendor patches; see the Systems Affected section below.

Creating files in /tmp with appropriate names may block the symbolic link attack, but it may also prevent kdesu from operating properly. It will not be a robust fix.

Vendor Information

982616
Expand all

Caldera

Updated:  May 17, 2001

Status

  Vulnerable

Vendor Statement

http://www.calderasystems.com/support/security/advisories/CSSA-2001-005.0.txt

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Conectiva

Notified:  January 23, 2001 Updated:  May 17, 2001

Status

  Vulnerable

Vendor Statement

http://www.linuxsecurity.com/advisories/other_advisory-1119.html

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

MandrakeSoft

Notified:  April 30, 2001 Updated:  May 17, 2001

Status

  Vulnerable

Vendor Statement

http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-046.php3?dis=8.0

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

RedHat

Notified:  April 25, 200 Updated:  May 17, 2001

Status

  Vulnerable

Vendor Statement

http://www.linuxsecurity.com/advisories/redhat_advisory-1335.html

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

SuSE

Notified:  January 23, 2001 Updated:  May 17, 2001

Status

  Vulnerable

Vendor Statement

http://www.linuxsecurity.com/advisories/suse_advisory-1113.html

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Credit

Initial information on this vulnerability came from a statement by Caldera Systems.

This document was last modified by Tim Shimeall.

Other Information

CVE IDs: CVE-2001-0178
Severity Metric: 8.10
Date Public: 2001-01-23
Date First Published: 2001-05-17
Date Last Updated: 2001-08-01 18:28 UTC
Document Revision: 11

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.