First published: Tue Sep 06 2005(Updated: )
kcheckpass in KDE 3.2.0 up to 3.4.2 allows local users to gain root access via a symlink attack on lock files.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
KDE KDE | =3.3.2 | |
KDE KDE | =3.3.1 | |
KDE KDE | =3.2.2 | |
KDE KDE | =3.2.1 | |
KDE KDE | =3.4.0 | |
KDE KDE | =3.2.0 | |
KDE KDE | =3.2.3 | |
KDE KDE | =3.4.2 | |
KDE KDE | =3.4.1 | |
KDE KDE | =3.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2494 has been classified as a high severity vulnerability due to the potential for local users to gain root access.
To mitigate CVE-2005-2494, it is recommended to upgrade to a patched version of KDE that is not affected by this vulnerability.
KDE versions 3.2.0 up to 3.4.2, including 3.2.1, 3.2.2, 3.3.0, 3.3.1, 3.3.2, 3.4.0, 3.4.1, and 3.4.2 are affected by CVE-2005-2494.
CVE-2005-2494 involves a symlink attack where local users can exploit lock files to gain elevated privileges.
CVE-2005-2494 is a local vulnerability that requires access to the affected system to exploit.