CVE-2004-1171
 
Severity Score
7.8
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
KDE 3.2.x and 3.3.0 through 3.3.2, when saving credentials that are (1) manually entered by the user or (2) created by the SMB protocol handler, stores those credentials for plaintext in the user's .desktop file, which may be created with world-readable permissions, which could allow local users to obtain usernames and passwords for remote resources such as SMB shares.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2004-12-10 CVE Reserved
- 2004-12-10 CVE Published
- 2024-08-08 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (16)
URL | Tag | Source |
---|---|---|
http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1292.html | Mailing List | |
http://marc.info/?l=bugtraq&m=110178786809694&w=2 | Mailing List | |
http://marc.info/?l=bugtraq&m=110261063201488&w=2 | Mailing List | |
http://secunia.com/advisories/13477 | Third Party Advisory | |
http://secunia.com/advisories/13486 | Third Party Advisory | |
http://secunia.com/advisories/13560 | Third Party Advisory | |
http://securitytracker.com/id?1012471 | Vdb Entry | |
http://www.ciac.org/ciac/bulletins/p-051.shtml | Government Resource | |
http://www.kb.cert.org/vuls/id/305294 | Third Party Advisory |
|
http://www.kde.org/info/security/advisory-20041209-1.txt | X_refsource_confirm | |
http://www.osvdb.org/12248 | Vdb Entry | |
http://www.sec-consult.com/index.php?id=118 | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18267 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.securityfocus.com/bid/11866 | 2017-07-11 |
URL | Date | SRC |
---|---|---|
http://www.gentoo.org/security/en/glsa/glsa-200412-16.xml | 2017-07-11 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2004:150 | 2017-07-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Kde Search vendor "Kde" | Kde Search vendor "Kde" for product "Kde" | 3.2 Search vendor "Kde" for product "Kde" and version "3.2" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kde Search vendor "Kde" for product "Kde" | 3.2.1 Search vendor "Kde" for product "Kde" and version "3.2.1" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kde Search vendor "Kde" for product "Kde" | 3.2.2 Search vendor "Kde" for product "Kde" and version "3.2.2" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kde Search vendor "Kde" for product "Kde" | 3.2.3 Search vendor "Kde" for product "Kde" and version "3.2.3" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kde Search vendor "Kde" for product "Kde" | 3.3 Search vendor "Kde" for product "Kde" and version "3.3" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kde Search vendor "Kde" for product "Kde" | 3.3.1 Search vendor "Kde" for product "Kde" and version "3.3.1" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kde Search vendor "Kde" for product "Kde" | 3.3.2 Search vendor "Kde" for product "Kde" and version "3.3.2" | - |
Affected
| ||||||
Mandrakesoft Search vendor "Mandrakesoft" | Mandrake Linux Search vendor "Mandrakesoft" for product "Mandrake Linux" | 10.0 Search vendor "Mandrakesoft" for product "Mandrake Linux" and version "10.0" | - |
Affected
| ||||||
Mandrakesoft Search vendor "Mandrakesoft" | Mandrake Linux Search vendor "Mandrakesoft" for product "Mandrake Linux" | 10.0 Search vendor "Mandrakesoft" for product "Mandrake Linux" and version "10.0" | amd64 |
Affected
| ||||||
Mandrakesoft Search vendor "Mandrakesoft" | Mandrake Linux Search vendor "Mandrakesoft" for product "Mandrake Linux" | 10.1 Search vendor "Mandrakesoft" for product "Mandrake Linux" and version "10.1" | - |
Affected
| ||||||
Mandrakesoft Search vendor "Mandrakesoft" | Mandrake Linux Search vendor "Mandrakesoft" for product "Mandrake Linux" | 10.1 Search vendor "Mandrakesoft" for product "Mandrake Linux" and version "10.1" | x86_64 |
Affected
| ||||||
Redhat Search vendor "Redhat" | Fedora Core Search vendor "Redhat" for product "Fedora Core" | core_2.0 Search vendor "Redhat" for product "Fedora Core" and version "core_2.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Fedora Core Search vendor "Redhat" for product "Fedora Core" | core_3.0 Search vendor "Redhat" for product "Fedora Core" and version "core_3.0" | - |
Affected
|