KDE Security Advisory: langen2kvtml temp file vulnerability
Posted on: 08/15/2005 05:31 AM

KDE Security Advisory: langen2kvtml tempfile vulnerability
Original Release Date: 2008-08-15
URL: http://www.kde.org/info/security/advisory-20050815-1.txt

0. References

CAN-2005-2101

1. Systems affected:

All KDE releases starting from KDE 3.0 up to including
KDE 3.4.2.

2. Overview:

Ben Burton notified the KDE security team about several
tempfile handling related vulnerabilities in langen2kvtml,
a conversion script for kvoctrain. This vulnerability was
initially discovered by Javier Fernendez-Sanguino Pefa.

The script uses known filenames in /tmp which allow an
local attacker to overwrite files writeable by the
user (manually) invoking the conversion script.

3. Impact:

A local file can overwrite files and possibly elevate
privileges.


4. Solution:

Source code patches have been made available which fix these
vulnerabilities. Contact your OS vendor / binary package provider
for information about how to obtain updated binary packages.


5. Patch:

Patch for KDE 3.4.2 is available from

ftp://ftp.kde.org/pub/kde/security_patches :

0e82c5810df3b04370188ba13cc50203 post-3.4.2-kdeedu.diff



Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/kde_security_advisory_langen2kvtml_temp_file_vulnerability.html)