First published: Thu Sep 18 2003(Updated: )
KDM in KDE 3.1.3 and earlier does not verify whether the pam_setcred function call succeeds, which may allow attackers to gain root privileges by triggering error conditions within PAM modules, as demonstrated in certain configurations of the MIT pam_krb5 module.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
KDE KDE | =2.2.1 | |
KDE KDE | =2.1.2 | |
KDE KDE | =2.0 | |
KDE KDE | =3.0.2 | |
KDE KDE | =3.0.5 | |
KDE KDE | =2.0_beta | |
KDE KDE | =2.2 | |
KDE KDE | =3.1.1a | |
KDE KDE | =2.0.1 | |
KDE KDE | =1.1 | |
KDE KDE | =1.1.1 | |
KDE KDE | =2.1.1 | |
KDE KDE | =3.0.3a | |
KDE KDE | =3.0.4 | |
KDE KDE | =3.1.2 | |
KDE KDE | =3.1.3 | |
KDE KDE | =3.0 | |
KDE KDE | =3.0.1 | |
KDE KDE | =3.0.5b | |
KDE KDE | =3.1 | |
KDE KDE | =2.1 | |
KDE KDE | =3.0.3 | |
KDE KDE | =3.1.1 | |
KDE KDE | =1.1.2 | |
KDE KDE | =1.2 | |
KDE KDE | =2.2.2 | |
KDE KDE | =3.0.5a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.