Vulnerability Name:

CVE-2003-0690 (CCN-13203)

Assigned:2003-09-16
Published:2003-09-16
Updated:2017-10-11
Summary:KDM in KDE 3.1.3 and earlier does not verify whether the pam_setcred function call succeeds, which may allow attackers to gain root privileges by triggering error conditions within PAM modules, as demonstrated in certain configurations of the MIT pam_krb5 module.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: SGI Security Advisory 20031002-01-U
SGI Advanced Linux Environment security update #3

Source: CCN
Type: BugTraq Mailing List, Tue Sep 16 2003 - 14:44:27 CDT
KDM vulnerabilities

Source: MISC
Type: UNKNOWN
http://cert.uni-stuttgart.de/archive/suse/security/2002/12/msg00101.html

Source: MITRE
Type: CNA
CVE-2003-0690

Source: CONECTIVA
Type: UNKNOWN
CLA-2003:747

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2003:747
kde

Source: BUGTRAQ
Type: UNKNOWN
20030916 [KDE SECURITY ADVISORY] KDM vulnerabilities

Source: CCN
Type: RHSA-2003-269
Updated KDE packages fix security issues

Source: CCN
Type: RHSA-2003-270
kdebase security update

Source: CCN
Type: RHSA-2003-286
Updated XFree86 packages provide security and bug fixes

Source: CCN
Type: RHSA-2003-287
Updated XFree86 packages provide security and bug fixes

Source: CCN
Type: RHSA-2003-288
Updated XFree86 packages provide security and bug fixes

Source: CCN
Type: RHSA-2003-289
XFree86 security update

Source: CCN
Type: CIAC Information Bulletin N-150
Red Hat Updated KDE packages fix security issues

Source: CCN
Type: CIAC Information Bulletin O-027
Red Hat Updated XFree86 Packages Provide Security and Bug Fixes

Source: DEBIAN
Type: UNKNOWN
DSA-388

Source: DEBIAN
Type: UNKNOWN
DSA-443

Source: DEBIAN
Type: DSA-388
kdebase -- several vulnerabilities

Source: DEBIAN
Type: DSA-443
xfree86 -- several vulnerabilities

Source: CCN
Type: GLSA-200311-01
kdebase: KDM vulnerabilities

Source: CCN
Type: K Desktop Environment (KDE) Web site
K Desktop Environment Home (kde.org)

Source: CCN
Type: KDE Security Advisory
KDM vulnerabilities

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.kde.org/info/security/advisory-20030916-1.txt

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2003:091

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2003:270

Source: REDHAT
Type: UNKNOWN
RHSA-2003:286

Source: REDHAT
Type: UNKNOWN
RHSA-2003:287

Source: REDHAT
Type: UNKNOWN
RHSA-2003:288

Source: REDHAT
Type: UNKNOWN
RHSA-2003:289

Source: CCN
Type: BID-8635
KDE KDM PAM Module PAM_SetCred Privilege Escalation Vulnerability

Source: CCN
Type: TLSA-2003-59
Two issues have been discovered in KDM

Source: XF
Type: UNKNOWN
kdm-pamkrb5-gain-privileges(13203)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:193

Source: SUSE
Type: SUSE-SA:2003:044
thttpd: remote privilege escalation/information leak

Source: SUSE
Type: SUSE-SA:2003:045
hylafax: remote code execution

Source: SUSE
Type: SUSE-SA:2003:046
sane: remote denial-of-service

Source: SUSE
Type: SUSE-SA:2003:047
bind8: cache poisoning/denial-of-service

Source: SUSE
Type: SUSE-SA:2003:049
Kernel brk() vulnerability: local root exploit

Source: SUSE
Type: SUSE-SA:2003:050
rsync: remote compromise

Vulnerable Configuration:Configuration 1:
  • cpe:/o:kde:kde:1.1:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:1.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:1.2:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:2.0_beta:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:2.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:2.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:2.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:2.2.2:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0.3:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0.3a:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0.4:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0.5:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0.5a:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0.5b:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.1.1a:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.1.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20030690
    V
    CVE-2003-0690
    2015-11-16
    oval:org.mitre.oval:def:193
    V
    KDM pam_setcred Privilege Escalation Vulnerability
    2007-04-25
    oval:org.debian:def:443
    V
    several vulnerabilities
    2004-02-19
    oval:org.debian:def:388
    V
    several vulnerabilities
    2003-09-19
    BACK
    kde kde 1.1
    kde kde 1.1.1
    kde kde 1.1.2
    kde kde 1.2
    kde kde 2.0
    kde kde 2.0.1
    kde kde 2.0_beta
    kde kde 2.1
    kde kde 2.1.1
    kde kde 2.1.2
    kde kde 2.2
    kde kde 2.2.1
    kde kde 2.2.2
    kde kde 3.0
    kde kde 3.0.1
    kde kde 3.0.2
    kde kde 3.0.3
    kde kde 3.0.3a
    kde kde 3.0.4
    kde kde 3.0.5
    kde kde 3.0.5a
    kde kde 3.0.5b
    kde kde 3.1
    kde kde 3.1.1
    kde kde 3.1.1a
    kde kde 3.1.2
    kde kde 3.1.3