start_kdeinit in KDE 3.5.5 through 3.5.9, when installed setuid root, allows local users to cause a denial of service and possibly execute arbitrary code via "user-influenceable input" (probably command-line arguments) that cause start_kdeinit to send SIGUSR1 signals to other processes.
Weaknesses in this category are typically introduced during the configuration of the software.
Link | Tags |
---|---|
http://secunia.com/advisories/30113 | third party advisory |
ftp://ftp.kde.org/pub/kde/security_patches/post-kde-3.5.5-kinit.diff | exploit |
http://security.gentoo.org/glsa/glsa-200804-30.xml | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html | vendor advisory |
http://www.securitytracker.com/id?1019924 | vdb entry |
http://secunia.com/advisories/29977 | third party advisory |
http://www.ubuntu.com/usn/usn-608-1 | vendor advisory |
http://secunia.com/advisories/29951 | third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2008/1370/references | vdb entry |
http://www.securityfocus.com/bid/28938 | vdb entry |
http://www.kde.org/info/security/advisory-20080426-2.txt | |
http://www.mandriva.com/security/advisories?name=MDVSA-2008:097 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42039 | vdb entry |