First published: Thu Mar 04 2010(Updated: )
Race condition in backend/ctrl.c in KDM in KDE Software Compilation (SC) 2.2.0 through 4.4.2 allows local users to change the permissions of arbitrary files, and consequently gain privileges, by blocking the removal of a certain directory that contains a control socket, related to improper interaction with ksm.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
KDE SC | =2.2.0 | |
KDE SC | =3.5.10 | |
KDE SC | =4.1.2 | |
KDE SC | =4.2.2 | |
KDE SC | =4.3.0 | |
KDE SC | =4.3.1 | |
KDE SC | =4.3.4 | |
KDE SC | =4.3.5 | |
KDE SC | =4.4.0 | |
KDE SC | =4.4.1 | |
KDE SC | =4.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0436 is classified as a high severity vulnerability due to the potential for privilege escalation.
To mitigate CVE-2010-0436, upgrade to a patched version of KDE Software Compilation that addresses the race condition issue.
Local users on systems running affected versions of KDE Software Compilation are at risk of CVE-2010-0436.
CVE-2010-0436 impacts KDE Software Compilation versions ranging from 2.2.0 to 4.4.2.
The exploit of CVE-2010-0436 involves a race condition that allows unauthorized permission changes to arbitrary files.