CVE-2010-0436 – kdm privilege escalation flaw
https://notcve.org/view.php?id=CVE-2010-0436
Race condition in backend/ctrl.c in KDM in KDE Software Compilation (SC) 2.2.0 through 4.4.2 allows local users to change the permissions of arbitrary files, and consequently gain privileges, by blocking the removal of a certain directory that contains a control socket, related to improper interaction with ksm. Condición de carrera en backend/ctrl.c en KDM en KDE Software Compilation (SC) v2.2.0 hasta v4.4.2 permite a usuarios locales cambiar de ficheros a su elección, y consecuentemente obtener privelegios, bloqueando el borrado de varios directorios que contienen sockets de control, relacionado con la interacción inadecuada con ksm. • ftp://ftp.kde.org/pub/kde/security_patches/kdebase-workspace-4.3.5-CVE-2010-0436.diff http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039533.html http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html http://rhn.redhat.com/errata/RHSA-2010-0348.html http://secunia.com/advisories/39419 http://secunia.com/advisories/39481 http://secunia.com/advisories/39506 http://www.debian.org/security/2010/dsa-2037 http://www.kde.org/info/security/ • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2010-0923
https://notcve.org/view.php?id=CVE-2010-0923
Race condition in workspace/krunner/lock/lockdlg.cc in the KRunner lock module in kdebase in KDE SC 4.4.0 allows physically proximate attackers to bypass KScreenSaver screen locking and access an unattended workstation by pressing the Enter key at a certain time, related to multiple forked processes. Condición de carrera en workspace/krunner/lock/lockdlg.cc en el módulo de bloqueo KRunner en kdebase en KDE SC 4.4.0 permite a atacantes próximos físicamente evitar el bloqueo de pantalla KScreenSaver y acceder a un ordenador presionando la tecla Enter durante un cierto tiempo, en relación con múltiples procesos bifurcados (forked). • http://bugs.kde.org/show_bug.cgi?id=226449 http://marc.info/?l=oss-security&m=126598163422670&w=2 http://marc.info/?l=oss-security&m=126599909614401&w=2 http://marc.info/?l=oss-security&m=126600468622421&w=2 http://secunia.com/advisories/38600 http://securitytracker.com/id? • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2009-4035 – xpdf: buffer overflow in FoFiType1::parse
https://notcve.org/view.php?id=CVE-2009-4035
The FoFiType1::parse function in fofi/FoFiType1.cc in Xpdf 3.0.0, gpdf 2.8.2, kpdf in kdegraphics 3.3.1, and possibly other libraries and versions, does not check the return value of the getNextLine function, which allows context-dependent attackers to execute arbitrary code via a PDF file with a crafted Type 1 font that can produce a negative value, leading to a signed-to-unsigned integer conversion error and a buffer overflow. La función FoFiType1::parse en fofi/FoFiType1.cc en Xpdf v3.0.0, en gpdf v2.8.2, en kpdf en kdegraphics v3.3.1, y posiblemente otras liberías y versiones, no verifica el valor de retorno de la función getNextLine, permite a los atacantes dependientes del contexto ejecutar código de su elección mediante un fichero PDF con una fuente Type 1 modificada que puede producir un valor negativo, conduciendo a un error de conversión de entero signed-to-unsigned y un desbordamiento de búfer. • http://cgit.freedesktop.org/poppler/poppler/diff/fofi/FoFiType1.cc?id=4b4fc5c0 http://cgit.freedesktop.org/poppler/poppler/tree/fofi/FoFiType1.cc?id=4b4fc5c017bf147c9069bbce32fc14467bd2a81a http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00003.html http://secunia.com/advisories/37641 http://secunia.com/advisories/37781 http://secunia.com/advisories/37787 http://secunia.com/advisories/37793 http://www.redhat.com/support/errata/RHSA-2009-1680.html http://www.redhat.com/support/errata • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2009-3805 – GPG2/Kleopatra 2.0.11 - Malformed Certificate
https://notcve.org/view.php?id=CVE-2009-3805
gpg2.exe in Gpg4win 2.0.1, as used in KDE Kleopatra 2.0.11, allows remote attackers to cause a denial of service (application crash) via a long certificate signature. gpg2.exe en Gpg4win v2.0.1, como el usado en KDE Kleopatra v2.0.11, permite a atacantes remotos causar una denegación de servicio (caída de programa) a través de una firma certificada larga. • https://www.exploit-db.com/exploits/9884 http://www.packetstormsecurity.com/0910-exploits/gpg2kleo-dos.txt http://www.securityfocus.com/bid/36781 https://exchange.xforce.ibmcloud.com/vulnerabilities/53908 •
CVE-2009-3606 – xpdf/poppler: PSOutputDev:: doImageL1Sep integer overflow
https://notcve.org/view.php?id=CVE-2009-3606
Integer overflow in the PSOutputDev::doImageL1Sep function in Xpdf before 3.02pl4, and Poppler 0.x, as used in kdegraphics KPDF, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow. Desbordamiento de entero en la función PSOutputDev::doImageL1Sep en Xpdf v3.02pl4 y Poppler v0.x, usado en n kdegraphics KPDF, podría permitir a atacantes remotos la ejecución de código de su elección a través de un documento PDF manipulado que provoca un desbordamiento de búfer basado en memoria dinámica (heap). • ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl4.patch http://cgit.freedesktop.org/poppler/poppler/diff/poppler/PSOutputDev.cc?id=7b2d314a61 http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035340.html http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035399.html http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035408.html http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html http://secunia.com/advisories/37023 http://s • CWE-189: Numeric Errors CWE-190: Integer Overflow or Wraparound •