CVE-2005-0078
CVSS4.6
发布时间 :2005-05-02 00:00:00
修订时间 :2010-08-21 00:25:27
NMCOPS    

[原文]The KDE screen saver in KDE before 3.0.5 does not properly check the return value from a certain function call, which allows attackers with physical access to cause a crash and access the desktop session.


[CNNVD]KDE Screensaver锁定绕过漏洞(CNNVD-200505-045)

        KDE 3.0.5 之前版本的KDE screen saver未能正确检查从某些函数调用返回的值,从而允许执行物理访问的攻击者引起程序崩溃以及访问桌面会话。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:kde:kde:1.1.2
cpe:/o:kde:kde:2.2
cpe:/o:redhat:enterprise_linux:3.0::advanced_servers
cpe:/o:kde:kde:3.0.3
cpe:/o:redhat:enterprise_linux:2.1::advanced_server
cpe:/o:kde:kde:2.0
cpe:/o:redhat:enterprise_linux:3.0::enterprise_server
cpe:/o:kde:kde:2.2_beta1
cpe:/o:redhat:enterprise_linux:2.1::enterprise_server
cpe:/o:kde:kde:2.1
cpe:/o:kde:kde:1.1
cpe:/o:redhat:enterprise_linux:3.0::workstation
cpe:/o:kde:kde:3.0.4
cpe:/o:debian:debian_linux:3.0::woody
cpe:/o:kde:kde:3.0.2
cpe:/o:redhat:enterprise_linux:2.1::workstation
cpe:/o:kde:kde:3.0_beta_1
cpe:/o:kde:kde:2.2.1
cpe:/o:kde:kde:2.1_beta1
cpe:/o:kde:kde:2.1_beta2
cpe:/o:kde:kde:1.0
cpe:/o:kde:kde:3.0.1
cpe:/o:kde:kde:3.0
cpe:/o:redhat:enterprise_linux_desktop:3.0Red Hat Desktop 3.0
cpe:/o:kde:kde:3.0_beta_2
cpe:/o:redhat:linux_advanced_workstation:2.1Red Hat Linux Advanced Workstation 2.1
cpe:/o:kde:kde:1.1.1
cpe:/o:kde:kde:2.0.1

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:9260Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote attackers to spoof arbitrary web sites by injecting content from one...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0078
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0078
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-045
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/19084
(VENDOR_ADVISORY)  XF  kdebase-screensaver-security-bypass(19084)
http://www.redhat.com/support/errata/RHSA-2005-009.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2005:009
http://www.debian.org/security/2005/dsa-660
(VENDOR_ADVISORY)  DEBIAN  DSA-660

- 漏洞信息

KDE Screensaver锁定绕过漏洞
中危 资料不足
2005-05-02 00:00:00 2005-10-20 00:00:00
本地  
        KDE 3.0.5 之前版本的KDE screen saver未能正确检查从某些函数调用返回的值,从而允许执行物理访问的攻击者引起程序崩溃以及访问桌面会话。

- 公告与补丁

        暂无数据

- 漏洞信息 (F35916)

dsa-660.txt (PacketStormID:F35916)
2005-01-27 00:00:00
 
advisory,local
linux,debian
CVE-2005-0078
[点击下载]

Debian Security Advisory 660-1 - The KDE screensaver can crash under certain local circumstances and can be exploited by an attacker with physical access to the workstation to take over the desktop session.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 660-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
January 26th, 2005                         http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : kdebse
Vulnerability  : missing return value check
Problem-Type   : local
Debian-specific: no
CVE ID         : CAN-2005-0078

Rapha    

- 漏洞信息

13204
KDE Screensaver Crash Local Bypass

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-01-26 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

KDE Screensaver Lock Bypass Vulnerability
Unknown 12373
No Yes
2005-01-26 12:00:00 2009-07-12 10:06:00
Discovery of this vulnerability is credited to Raphaël Enrici.

- 受影响的程序版本

SGI ProPack 3.0
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux WS 2.1 IA64
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux ES 3
RedHat Enterprise Linux ES 2.1 IA64
RedHat Enterprise Linux ES 2.1
RedHat Desktop 3.0
RedHat Advanced Workstation for the Itanium Processor 2.1 IA64
RedHat Advanced Workstation for the Itanium Processor 2.1
Red Hat Enterprise Linux AS 3
Red Hat Enterprise Linux AS 2.1 IA64
Red Hat Enterprise Linux AS 2.1
KDE KDE 2.2.2
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ Debian Linux 3.0
+ Debian Linux 2.2 sparc
+ Debian Linux 2.2 powerpc
+ Debian Linux 2.2 IA-32
+ Debian Linux 2.2 arm
+ Debian Linux 2.2 alpha
+ Debian Linux 2.2 68k
+ Debian Linux 2.2
+ Mandriva Linux Mandrake 8.2 ppc
+ Mandriva Linux Mandrake 8.2 ppc
+ Mandriva Linux Mandrake 8.2
+ Mandriva Linux Mandrake 8.2
+ Mandriva Linux Mandrake 8.1 ia64
+ Mandriva Linux Mandrake 8.1 ia64
+ Mandriva Linux Mandrake 8.1
+ Mandriva Linux Mandrake 8.1
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1
+ Red Hat Enterprise Linux AS 2.1
+ RedHat Advanced Workstation for the Itanium Processor 2.1
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1
+ RedHat Enterprise Linux WS 2.1
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 i386
+ RedHat Linux Advanced Work Station 2.1
+ Sun Linux 5.0.7
+ Sun Linux 5.0.7
+ Sun Linux 5.0.6
+ Sun Linux 5.0.6
+ Sun Linux 5.0.5
+ Sun Linux 5.0.5
KDE KDE 2.2.1
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Server 3.1
+ Caldera OpenLinux Server 3.1
+ Caldera OpenLinux Workstation 3.1.1
+ Caldera OpenLinux Workstation 3.1
+ Caldera OpenLinux Workstation 3.1
+ Mandriva Linux Mandrake 8.1 ia64
+ Mandriva Linux Mandrake 8.1
KDE KDE 2.2
KDE KDE 2.1.2
+ Conectiva Linux 7.0
KDE KDE 2.1.1
KDE KDE 2.1
KDE KDE 2.0.1
+ Conectiva Linux 6.0
KDE KDE 2.0 BETA
KDE KDE 2.0

- 漏洞讨论

Debian has reported that a vulnerability in the screensaver was discovered. According to the report, a malicious user with console access (i.e. physical) can cause the screensaver to crash. The feature will fail-open, allowing access to the desktop after it terminates.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Debian has issued fixes in advisory DSA 660-1. See the reference section for details.

Red Hat has released advisory RHSA-2005:009-19 to address issues in KDE. Please see the advisory in Web references for more information.

SGI has released advisory 20050207-01-U including Patch 10144 that contains updated SGI ProPack 3 Service Pack 4 RPMs for the SGI Altix products. This patch addresses various issues. Please see the referenced advisory for more information.


KDE KDE 2.2.2

SGI ProPack 3.0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站