First published: Mon Apr 28 2008(Updated: )
start_kdeinit in KDE 3.5.5 through 3.5.9, when installed setuid root, allows local users to cause a denial of service and possibly execute arbitrary code via "user-influenceable input" (probably command-line arguments) that cause start_kdeinit to send SIGUSR1 signals to other processes.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
KDE Kde Beta 3 | =3.5.5 | |
KDE Kde Beta 3 | =3.5.6 | |
KDE Kde Beta 3 | =3.5.7 | |
KDE Kde Beta 3 | =3.5.8 | |
KDE Kde Beta 3 | =3.5.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1671 is classified as a high severity vulnerability due to its potential for denial of service and arbitrary code execution.
To mitigate CVE-2008-1671, remove the setuid bit from the start_kdeinit binary or upgrade to a non-vulnerable version of KDE.
CVE-2008-1671 affects local users running KDE 3.5.5 through 3.5.9 with the start_kdeinit component installed setuid root.
CVE-2008-1671 exploits user-influenceable input, specifically command-line arguments, to send SIGUSR1 signals to other processes.
KDE versions 3.5.5, 3.5.6, 3.5.7, 3.5.8, and 3.5.9 are affected by CVE-2008-1671.