This is an RFC 1153 digest.
(1 message)
----------------------------------------------------------------------

MIME-Version: 1.0
Content-Type: multipart/signed;
  boundary="nextPart3299507.2LB49Mv2NH";
  protocol="application/pgp-signature";
  micalg=pgp-sha1
Content-Transfer-Encoding: 7bit
Message-Id: <[EMAIL PROTECTED]>
From: Dirk Mueller <[EMAIL PROTECTED]>
To: [email protected]
Subject: [KDE Security Advisory] Buffer overflow in fliccd of kdeedu/kstars/indi
Date: Wed, 16 Feb 2005 02:40:25 +0100

--nextPart3299507.2LB49Mv2NH
Content-Type: text/plain;
  charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline


KDE Security Advisory: Buffer overflow in fliccd of kdeedu/kstars/indi
Original Release Date: 2005-02-15
URL: http://www.kde.org/info/security/advisory-20050215-1.txt


0. References

        http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2005-0011


1. Systems affected:

        KDE 3.3 up to including KDE 3.3.2.


2. Overview:

        KStars includes support for the Instrument Neutral Distributed
        Interface (INDI). The build system of this extra 3rd party
        software contained an installation hook to install fliccd (part
        of INDI) as SUID root application.=20

        Erik Sj=F6lund discovered that the code contains several
        vulnerabilities that allow stack based buffer overflows.


3. Impact:

        If the fliccd binary is installed as suid root, it enables root
        privilege escalation for local users, or, if the daemon is
        actually running (which it does not by default) and is running
        as root, remote root privilege escalation.


4. Solution:

        Source code patches have been made available which fix these
        vulnerabilities. Contact your OS vendor / binary package provider
        for information about how to obtain updated binary packages.


5. Patch:

        A patch for 3.3.2 is available from=20
        ftp://ftp.kde.org/pub/kde/security_patches :

        2b9c8330bec2c0dc6669ccc40b24dd70  post-3.3.2-kdeedu-kstars.diff



6. Time line and credits:
        05/01/2005  Erik Sj=F6lund notifies Debian Security.
        07/01/2005  Martin Schulze from the Debian Security team=20
                    notifies KDE security team about the vulnerabilities.
        09/01/2005  Dirk Mueller from KDE security team develops
                    a patch that addresses the discovered and similiar
                    vulnerabilities. Contacting Jasem Mutlaq, the
                    author of INDI.
        21/01/2005  Regressions are discovered with the patch and
                    subsequently fixed over the next few days.
        15/02/2005  Coordinated public disclosure.



--nextPart3299507.2LB49Mv2NH
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQBCEqSMvsXr+iuy1UoRAqpdAKD2pxwRW7GB5d7KRA96AwhnHgGxswCdGdMA
BZRxANdIDXoZAT+HlqmUFGA=
=tTO1
-----END PGP SIGNATURE-----

--nextPart3299507.2LB49Mv2NH--

------------------------------

End of this Digest
******************

-- 
Raj Mathur                [EMAIL PROTECTED]      http://kandalaya.org/
       GPG: 78D4 FC67 367F 40E2 0DD5  0FEF C968 D0EF CC68 D17F
                      It is the mind that moves


-------------------------------------------------------
SF email is sponsored by - The IT Product Guide
Read honest & candid reviews on hundreds of IT Products from real users.
Discover which products truly live up to the hype. Start reading now.
http://ads.osdn.com/?ad_id=6595&alloc_id=14396&op=click
_______________________________________________
linux-india-help mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/linux-india-help

Reply via email to