Vulnerability Name: | CVE-2005-0205 (CCN-19524) | ||||||||||||||||
Assigned: | 2005-02-28 | ||||||||||||||||
Published: | 2005-02-28 | ||||||||||||||||
Updated: | 2017-10-11 | ||||||||||||||||
Summary: | KPPP 2.1.2 in KDE 3.1.5 and earlier, when setuid root without certain wrappers, does not properly close a privileged file descriptor for a domain socket, which allows local users to read and write to /etc/hosts and /etc/resolv.conf and gain control over DNS name resolution by opening a number of file descriptors before executing kppp. | ||||||||||||||||
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||
CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||
Vulnerability Consequences: | File Manipulation | ||||||||||||||||
References: | Source: CCN Type: KDE Security patch ftp site KDE Security patch ftp index Source: MITRE Type: CNA CVE-2005-0205 Source: CONECTIVA Type: Patch CLA-2005:934 Source: CCN Type: KDE Web site K Desktop Environment Source: CCN Type: RHSA-2005-175 kdenetwork security update Source: CCN Type: CIAC INFORMATION BULLETIN P-151 kdenetwork Package Vulnerability Source: DEBIAN Type: Patch, Vendor Advisory DSA-692 Source: DEBIAN Type: DSA-692 kdenetwork -- design flaw Source: IDEFENSE Type: Patch, Vendor Advisory 20050228 KPPP Privileged File Descriptor Leak Vulnerability Source: CCN Type: iDEFENSE Security Advisory: 02.28.05 KPPP Privileged File Descriptor Leak Vulnerability Source: CCN Type: KDE Security Advisory 20050228-1 kppp Privileged fd Leak Vulnerability Source: CONFIRM Type: Patch, Vendor Advisory http://www.kde.org/info/security/advisory-20050228-1.txt Source: REDHAT Type: Patch, Vendor Advisory RHSA-2005:175 Source: CCN Type: BID-12677 KPPP Privileged File Descriptor Leakage Vulnerability Source: XF Type: UNKNOWN kde-kppp-domain-resolution-hijack(19524) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:9596 | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration CCN 1: ![]() | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |