First published: Mon Feb 28 2005(Updated: )
KPPP 2.1.2 in KDE 3.1.5 and earlier, when setuid root without certain wrappers, does not properly close a privileged file descriptor for a domain socket, which allows local users to read and write to /etc/hosts and /etc/resolv.conf and gain control over DNS name resolution by opening a number of file descriptors before executing kppp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bernd Wuebben Kppp | =2.1.2 | |
KDE Kde Beta 3 | =3.1 | |
KDE Kde Beta 3 | =3.1.1 | |
KDE Kde Beta 3 | =3.1.2 | |
KDE Kde Beta 3 | =3.1.3 | |
KDE Kde Beta 3 | =3.1.4 | |
KDE Kde Beta 3 | =3.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0205 is considered a moderate severity vulnerability due to its potential impact on local users' access to critical system files.
To fix CVE-2005-0205, ensure that KPPP is not setuid root or apply the latest security patches provided by your distribution.
CVE-2005-0205 affects users of KPPP version 2.1.2 and KDE versions 3.1.5 and earlier.
Exploitation of CVE-2005-0205 can allow local users to alter DNS name resolution by manipulating system files like /etc/hosts and /etc/resolv.conf.
CVE-2005-0205 is classified as a local threat, impacting users with local access to the affected systems.