CVE-2008-1671
Summary
| CVE | CVE-2008-1671 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2008-04-28 17:05:00 UTC |
| Updated | 2017-08-08 01:30:00 UTC |
| Description | start_kdeinit in KDE 3.5.5 through 3.5.9, when installed setuid root, allows local users to cause a denial of service and possibly execute arbitrary code via "user-influenceable input" (probably command-line arguments) that cause start_kdeinit to send SIGUSR1 signals to other processes. |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|
| Operating System |
Kde |
Kde |
3.5.5 |
All |
All |
All |
| Operating System |
Kde |
Kde |
3.5.6 |
All |
All |
All |
| Operating System |
Kde |
Kde |
3.5.7 |
All |
All |
All |
| Operating System |
Kde |
Kde |
3.5.8 |
All |
All |
All |
| Operating System |
Kde |
Kde |
3.5.9 |
All |
All |
All |
| Operating System |
Kde |
Kde |
3.5.5 |
All |
All |
All |
| Operating System |
Kde |
Kde |
3.5.6 |
All |
All |
All |
| Operating System |
Kde |
Kde |
3.5.7 |
All |
All |
All |
| Operating System |
Kde |
Kde |
3.5.8 |
All |
All |
All |
| Operating System |
Kde |
Kde |
3.5.9 |
All |
All |
All |
References
| Reference | Source | Link | Tags |
|---|
| [security-announce] SUSE Security Summary Report SUSE-SR:200?8:011 |
SUSE |
lists.opensuse.org |
|
| www.kde.org/info/security/advisory-20080426-2.txt |
CONFIRM |
www.kde.org |
|
| Webmail - OVH |
VUPEN |
www.vupen.com |
|
| Ubuntu update for kdelibs - Advisories - Secunia |
SECUNIA |
secunia.com |
|
| ftp.kde.org/pub/kde/security_patches/post-kde-3.5.5-kinit.diff |
CONFIRM |
ftp.kde.org |
Exploit |
| Support / Security / Advisories / / MDVSA-2008:097 | Mandriva |
MANDRIVA |
www.mandriva.com |
|
| Gentoo update for kde - Advisories - Secunia |
SECUNIA |
secunia.com |
|
| USN-608-1: KDE vulnerability | Ubuntu |
UBUNTU |
www.ubuntu.com |
|
| KDE start_kdeinit: Multiple vulnerabilities — Gentoo Linux Documentation |
GENTOO |
security.gentoo.org |
|
| KDE start_kdeinit Privilege Escalation Vulnerability - Advisories - Secunia |
SECUNIA |
secunia.com |
Vendor Advisory |
| IBM X-Force Exchange |
XF |
exchange.xforce.ibmcloud.com |
|
| KDE 'start_kdeinit' Multiple Local Privilege Escalation Vulnerabilities |
BID |
www.securityfocus.com |
|
| KDE start_kdeinit Input Validation Flaw May Let Local Users Gain Elevated Privileges - SecurityTracker |
SECTRACK |
www.securitytracker.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|
| Red Hat | 2008-05-01 | Joshua Bressers | Not vulnerable. This issue did not affect versions of KDE as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5. |
There are currently no legacy QID mappings associated with this CVE.