First published: Wed Jul 13 2016(Updated: )
kinit in KDE Frameworks before 5.23.0 uses weak permissions (644) for /tmp/xauth-xxx-_y, which allows local users to obtain X11 cookies of other users and consequently capture keystrokes and possibly gain privileges by reading the file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE | =42.1 | |
openSUSE | =13.2 | |
KDE KDE Frameworks | <=5.22.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-3100 is considered important due to its potential to allow local users to access sensitive information.
To fix CVE-2016-3100, you should upgrade to KDE Frameworks version 5.23.0 or later.
CVE-2016-3100 affects users of KDE Frameworks versions up to 5.22.0 and specific versions of openSUSE.
Similar vulnerabilities may include those that involve insecure file permission settings that expose sensitive data.
Yes, CVE-2016-3100 can potentially lead to privilege escalation by allowing access to X11 cookies.