---------------------------------------------------------------------- Secunia CSI + Microsoft SCCM ----------------------- = Extensive Patch Management http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ ---------------------------------------------------------------------- TITLE: KDE KDM Socket Race Condition Privilege Escalation SECUNIA ADVISORY ID: SA39393 VERIFY ADVISORY: http://secunia.com/advisories/39393/ DESCRIPTION: A security issue has been reported in KDE, which can be exploited by malicious, local users to gain escalated privileges. The security issue is caused due to a race condition within KDM when creating the control socket during a user login. This can be exploited to change the access permissions of arbitrary files to world-writable, which can be leveraged to e.g. execute arbitrary code with escalated privileges. The security issue is reported in KDE SC 2.2.0 through KDE SC 4.4.2. SOLUTION: Apply patch if available. KDE 4.3.x-4.4.x: ftp://ftp.kde.org/pub/kde/security_patches/kdebase-workspace-4.3.5-CVE-2010-0436.diff PROVIDED AND/OR DISCOVERED BY: The vendor credits Sebastian Krahmer from the SUSE Security Team. CHANGELOG: 2010-04-14: Added CVE reference. ORIGINAL ADVISORY: http://www.kde.org/info/security/advisory-20100413-1.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------