CVE-2004-0689
CVSS4.6
发布时间 :2004-09-28 00:00:00
修订时间 :2016-10-17 22:47:54
NMCOPS    

[原文]KDE before 3.3.0 does not properly handle when certain symbolic links point to "stale" locations, which could allow local users to create or truncate arbitrary files.


[CNNVD]KDE Konqueror帧注入漏洞(CNNVD-200409-075)

        
        KDE是一款免费开放源代码X桌面管理程序。
        KDE Konqueror浏览器不正确检查目标帧是否属于当前WEB页,远程攻击者可以利用这个漏洞获得用户的敏感信息。
        KDE Konqueror浏览器允许一个浏览器窗口装载另一个窗口的帧内容,因此攻击者可以构建恶意页面,允许恶意站点装载任何属于可信站点中另一个窗口中的任意帧内容,可造成目标用户敏感信息泄露。
        

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:9334KDE before 3.3.0 does not properly handle when certain symbolic links point to "stale" locations, which could allow local users to create or...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0689
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0689
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200409-075
(官方数据源) CNNVD

- 其它链接及资源

http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000864
(UNKNOWN)  CONECTIVA  CLA-2004:864
http://marc.info/?l=bugtraq&m=109225538901170&w=2
(UNKNOWN)  BUGTRAQ  20040811 KDE Security Advisories: Temporary File and Konqueror Frame Injection Vulnerabilities
http://security.gentoo.org/glsa/glsa-200408-13.xml
(VENDOR_ADVISORY)  GENTOO  200408-13
http://www.debian.org/security/2004/dsa-539
(VENDOR_ADVISORY)  DEBIAN  DSA-539
http://www.kde.org/info/security/advisory-20040811-1.txt
(VENDOR_ADVISORY)  CONFIRM  http://www.kde.org/info/security/advisory-20040811-1.txt
http://xforce.iss.net/xforce/xfdb/16963
(VENDOR_ADVISORY)  XF  kde-application-symlink(16963)

- 漏洞信息

KDE Konqueror帧注入漏洞
中危 竞争条件
2004-09-28 00:00:00 2005-10-20 00:00:00
本地  
        
        KDE是一款免费开放源代码X桌面管理程序。
        KDE Konqueror浏览器不正确检查目标帧是否属于当前WEB页,远程攻击者可以利用这个漏洞获得用户的敏感信息。
        KDE Konqueror浏览器允许一个浏览器窗口装载另一个窗口的帧内容,因此攻击者可以构建恶意页面,允许恶意站点装载任何属于可信站点中另一个窗口中的任意帧内容,可造成目标用户敏感信息泄露。
        

- 公告与补丁

        厂商补丁:
        KDE
        ---
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Patches for KDE 3.0.5b
        ftp://ftp.kde.org/pub/kde/security_patches :
        aa3ac08a45851a1c33b2fcd435e1d514 post-3.0.5b-kdelibs-htmlframes.patch
        dc4dfff2df75d19e527368f56dc92abb post-3.0.5b-kdebase-htmlframes.patch
        Patches for KDE 3.1.5
        ftp://ftp.kde.org/pub/kde/security_patches :
        e6cebe1f93f7497d720018362077dcf7 post-3.1.5-kdelibs-htmlframes.patch
        caa562da0735deacba3ae9170f2bf18f post-3.1.5-kdebase-htmlframes.patch
        Patches for KDE 3.2.3
        ftp://ftp.kde.org/pub/kde/security_patches :
        8384f2785295be7082d9984ba8e175eb post-3.2.3-kdelibs-htmlframes.patch
        a60fd1628607d4abdeb930662d126171 post-3.2.3-kdebase-htmlframes.patch

- 漏洞信息 (F34026)

KDE Security Advisory 2004-08-11.1 (PacketStormID:F34026)
2004-08-12 00:00:00
KDE Desktop  kde.org
advisory,denial of service,arbitrary,local
linux,suse
CVE-2004-0689
[点击下载]

KDE Security Advisory - The SUSE security team was alerted that in some cases the integrity of symlinks used by KDE are not ensured and that these symlinks can be pointing to stale locations. This can be abused by a local attacker to create or truncate arbitrary files or to prevent KDE applications from functioning correctly (Denial of Service). All versions of KDE up to KDE 3.2.3 inclusive.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

KDE Security Advisory: Temporary Directory Vulnerability
Original Release Date: 2004-08-11
URL: http://www.kde.org/info/security/advisory-20040811-1.txt

0. References

        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0689


1. Systems affected:

        All versions of KDE up to KDE 3.2.3 inclusive. 


2. Overview:

        The SUSE security team was alerted that in some cases the
        integrity of symlinks used by KDE are not ensured and that
        these symlinks can be pointing to stale locations. This can
        be abused by a local attacker to create or truncate arbitrary
        files or to prevent KDE applications from functioning
        correctly (Denial of Service).

        KDE creates in ~/.kde symlinks to a temporary directory, a socket
        directory and a cache directory. When a user logs into the KDE
        environment the startkde script ensures that these symlinks are
        present and point to directories that are owned by the user.
        However, when a user runs KDE applications outside the KDE
        environment or when a user runs a KDE applications as another user, 
        such as root, the integrity of these symlinks is not checked and it
        is possible that a previously created but now stale symlinks exist.

        The Common Vulnerabilities and Exposures project (cve.mitre.org)
        has assigned the name CAN-2004-0689 to this issue.


3. Impact:

        When a stale symlink is present a local attacker could create the
        directory that the symlink is pointing to with his own credentials
        to prevent access to this directory by KDE applications. This can
        prevent KDE applications from functioning correctly.

        When a stale symlink is present a local attacker could create the
        directory that the symlink is pointing to with his own credentials.
        Since KDE applications will attempt to create files with certain
        known names in this directory, an attacker can abuse this to overwrite
        arbitrary files with the privileges of the user.


4. Solution:

        Source code patches have been made available which fix these
        vulnerabilities. Contact your OS vendor / binary package provider
        for information about how to obtain updated binary packages.


5. Patch:

        Patches for KDE 3.0.5b are available from
        ftp://ftp.kde.org/pub/kde/security_patches : 

  da950a651e69cd810019efce284120fc  post-3.0.5b-kdelibs-kstandarddirs.patch

        Patches for KDE 3.1.5 are available from
        ftp://ftp.kde.org/pub/kde/security_patches : 

  c97ab0cf014adb59e315047210316f5d  post-3.1.5-kdelibs-kstandarddirs.patch

        Patches for KDE 3.2.3 are available from
        ftp://ftp.kde.org/pub/kde/security_patches : 

  345ce2e01cfdfa4754c47894c0271dcc  post-3.2.3-kdelibs-kstandarddirs.patch


6. Time line and credits:


        23/06/2004 SUSE Security Team alerted by Andrew Tuitt
	26/06/2004 Patches created
	27/07/2004 Vendors notified
        11/08/2004 Public advisory

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQFBGioUN4pvrENfboIRAnALAJ9ynwVAnzRtkDghmItkkCTe8qu/eACfabZc
X/9KZihVfSQKjOHvmvBOzv0=
=VM4l
-----END PGP SIGNATURE-----

    

- 漏洞信息

8589
KDE DCOPServer Insecure Temporary File Manipulation
Local Access Required Misconfiguration
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

KDE DCOPServer contains a flaw that may allow a malicious user to compromise local user accounts. The issue is triggered when DCOPserver creates insecure temporary files which may be used for authentication purposes occurs. It is possible that the flaw may allow a local attacker to compromise local accounts that run applications within KDE resulting in a loss of confidentiality, and integrity.

- 时间线

2004-08-11 Unknow
2004-08-11 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, KDE has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

KDE Insecure Temporary Directory Symlink Vulnerability
Race Condition Error 10922
No Yes
2004-08-11 12:00:00 2009-07-12 06:16:00
Andrew Tuitt disclosed this vulnerability to the SuSE Security Team.

- 受影响的程序版本

Mandriva Linux Mandrake 10.0 AMD64
Mandriva Linux Mandrake 10.0
Mandriva Linux Mandrake 9.2 amd64
Mandriva Linux Mandrake 9.2
KDE KDE 3.2.3
KDE KDE 3.2.2
+ KDE KDE 3.2.2
+ Red Hat Fedora Core2
KDE KDE 3.2.1
KDE KDE 3.2
KDE KDE 3.1.5
KDE KDE 3.1.4
KDE KDE 3.1.3
+ Red Hat Enterprise Linux AS 3
+ Red Hat Enterprise Linux AS 3
+ RedHat Desktop 3.0
+ RedHat Desktop 3.0
+ RedHat Enterprise Linux ES 3
+ RedHat Enterprise Linux ES 3
+ RedHat Enterprise Linux WS 3
KDE KDE 3.1.2
+ Conectiva Linux 9.0
+ Conectiva Linux 9.0
+ KDE KDE 3.1.2
KDE KDE 3.1.1 a
KDE KDE 3.1.1
+ Conectiva Linux 9.0
+ S.u.S.E. Linux Personal 8.2
+ S.u.S.E. Linux Personal 8.2
KDE KDE 3.1
+ RedHat Linux 9.0 i386
+ S.u.S.E. Linux 8.1
+ S.u.S.E. Linux 8.1
KDE KDE 3.0.5 b
KDE KDE 3.0.5 a
+ RedHat Linux 8.0 i386
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.3 i386
KDE KDE 3.0.5
+ Conectiva Linux 8.0
KDE KDE 3.0.4
+ Conectiva Linux 8.0
+ Gentoo Linux 1.4 _rc1
+ Gentoo Linux 1.2
+ Gentoo Linux 1.2
KDE KDE 3.0.3 a
KDE KDE 3.0.3
+ Conectiva Linux 8.0
+ Conectiva Linux 8.0
+ Conectiva Linux Enterprise Edition 1.0
+ FreeBSD FreeBSD 4.7 -STABLE
+ FreeBSD FreeBSD 4.7 -STABLE
+ Mandriva Linux Mandrake 9.0
+ Mandriva Linux Mandrake 9.0
KDE KDE 3.0.2
+ Mandriva Linux Mandrake 8.2
KDE KDE 3.0.1
KDE KDE 3.0
+ Conectiva Linux 8.0
KDE KDE 2.2.2
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ Debian Linux 3.0
+ Debian Linux 2.2 sparc
+ Debian Linux 2.2 powerpc
+ Debian Linux 2.2 IA-32
+ Debian Linux 2.2 arm
+ Debian Linux 2.2 alpha
+ Debian Linux 2.2 68k
+ Debian Linux 2.2
+ Mandriva Linux Mandrake 8.2 ppc
+ Mandriva Linux Mandrake 8.2 ppc
+ Mandriva Linux Mandrake 8.2
+ Mandriva Linux Mandrake 8.2
+ Mandriva Linux Mandrake 8.1 ia64
+ Mandriva Linux Mandrake 8.1 ia64
+ Mandriva Linux Mandrake 8.1
+ Mandriva Linux Mandrake 8.1
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1
+ Red Hat Enterprise Linux AS 2.1
+ RedHat Advanced Workstation for the Itanium Processor 2.1
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1
+ RedHat Enterprise Linux WS 2.1
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 i386
+ RedHat Linux Advanced Work Station 2.1
+ Sun Linux 5.0.7
+ Sun Linux 5.0.7
+ Sun Linux 5.0.6
+ Sun Linux 5.0.6
+ Sun Linux 5.0.5
+ Sun Linux 5.0.5
KDE KDE 2.2.1
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Server 3.1
+ Caldera OpenLinux Server 3.1
+ Caldera OpenLinux Workstation 3.1.1
+ Caldera OpenLinux Workstation 3.1
+ Caldera OpenLinux Workstation 3.1
+ Mandriva Linux Mandrake 8.1 ia64
+ Mandriva Linux Mandrake 8.1
KDE KDE 2.2
KDE KDE 2.1.2
+ Conectiva Linux 7.0
KDE KDE 2.1.1
KDE KDE 2.1
KDE KDE 2.0.1
+ Conectiva Linux 6.0
KDE KDE 2.0 BETA
KDE KDE 2.0
KDE KDE 1.2
- S.u.S.E. Linux 6.4
KDE KDE 1.1.2
+ Caldera OpenLinux 2.3
+ Mandriva Linux Mandrake 7.0
KDE KDE 1.1.1
KDE KDE 1.1
Gentoo Linux 1.4

- 漏洞讨论

KDE is reported to contain a temporary directory symlink vulnerability. This vulnerability is due to improper validation of the ownership of temporary directories.

Local attackers can cause KDE applications to fail, denying service to users, or to overwrite arbitrary files with the privileges of the target user. Privilege escalation may be possible.

Source patches have been made available by KDE to resolve this issue.

- 漏洞利用

An exploit is not required.

- 解决方案

Gentoo Linux has released advisory GLSA 200408-13 addressing this, and other issues. Please see the referenced advisory for further information. Users of affected packages are urged to execute the following commands with superuser privileges:
emerge sync
emerge -pv ">=kde-base/kdebase-3.2.3-r1"
emerge ">=kde-base/kdebase-3.2.3-r1"
emerge -pv ">=kde-base/kdelibs-3.2.3-r1"
emerge ">=kde-base/kdelibs-3.2.3-r1"

OpenBSD has included patches to fix this issue in OpenBSD-current as of 14 Aug 2004. These patches have not been included in 3.4 or 3.5 at the time of this update.

Debian has released an advisory (DSA 539-1) to address this issue. Please see the referenced advisory for more information.

Mandrake Linux has released an advisory (MDKSA-2004:086) along with fixes to address this, and other issues. Please see the referenced advisory for further information.

KDE has released patches resolving this issue:

RedHat has released advisories (FEDORA-2004-290, FEDORA-2004-291) to address various issues affecting KDE in Fedora Core 1 and Core 2. Please see the referenced advisories for more information.

Conectiva Linux has released advisory CLA-2004:864 along with fixes dealing with this and other issues. Please see the referenced advisory for more information.

Red Hat has released an advisory (RHSA-2004:412-10) to address various issues affecting KDE in Red Hat Enterprise Linux. Please see the advisory in Web references for more information.


KDE KDE 2.2.2

KDE KDE 3.0

KDE KDE 3.0.1

KDE KDE 3.0.2

KDE KDE 3.0.3 a

KDE KDE 3.0.3

KDE KDE 3.0.4

KDE KDE 3.0.5

KDE KDE 3.0.5 b

KDE KDE 3.0.5 a

KDE KDE 3.1

KDE KDE 3.1.1

KDE KDE 3.1.1 a

KDE KDE 3.1.2

KDE KDE 3.1.3

KDE KDE 3.1.4

KDE KDE 3.1.5

KDE KDE 3.2

KDE KDE 3.2.1

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站