int(1456)

Boletines de Vulnerabilidades


Denegación de servicio local en el demonio dcopserver de KDE

Clasificación de la vulnerabilidad

Propiedad Valor
Nivel de Confianza Oficial
Impacto Interrupcion del Servicio
Dificultad Experto
Requerimientos del atacante Acceso remoto con cuenta

Información sobre el sistema

Propiedad Valor
Fabricant afectat GNU/Linux
Software afectado KDE <3.4

Descripción

Se ha descubierto una vulnerabilidad en las versiones anteriores a la 3.4 de KDE. La vulnerabilidad reside en el demonio DCOP (Desktop Communication Protocol).

La explotación de esta vulnerabilidad podría permitir a un atacante local limitar la funcionalidad del escritorio para el resto de los usuarios del sistema.

Solución

Si lo desea, aplique los mecanismos de actualización propios de su distribución, o bien baje las fuentes del software y compílelo usted mismo.


Actualización de software

KDE
KDE 3.4
http://www.kde.org/download/
KDE 3.1.x - Parche
ftp://ftp.kde.org/pub/kde/security_patches/post-3.1.5-kdelibs-dcop.patch
KDE 3.2.x - Parche
ftp://ftp.kde.org/pub/kde/security_patches/post-3.2.3-kdelibs-dcop.patch
KDE 3.3.x - Parche
ftp://ftp.kde.org/pub/kde/security_patches/post-3.3.2-kdelibs-dcop.patch

Mandrake Linux

Mandrakelinux 10.0
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kdelibs-common-3.2-36.12.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/libkdecore4-3.2-36.12.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/libkdecore4-devel-3.2-36.12.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/kdelibs-3.2-36.12.100mdk.src.rpm
AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kdelibs-common-3.2-36.12.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/lib64kdecore4-3.2-36.12.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/lib64kdecore4-devel-3.2-36.12.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/kdelibs-3.2-36.12.100mdk.src.rpm

Mandrakelinux 10.1
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kdelibs-common-3.2.3-104.2.101mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/libkdecore4-3.2.3-104.2.101mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/libkdecore4-devel-3.2.3-104.2.101mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/kdelibs-3.2.3-104.2.101mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kdelibs-common-3.2.3-104.2.101mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/lib64kdecore4-3.2.3-104.2.101mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/lib64kdecore4-devel-3.2.3-104.2.101mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/libkdecore4-3.2.3-104.2.101mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/kdelibs-3.2.3-104.2.101mdk.src.rpm

Corporate Server 3.0
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kdelibs-common-3.2-36.12.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/libkdecore4-3.2-36.12.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/libkdecore4-devel-3.2-36.12.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/kdelibs-3.2-36.12.C30mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/kdelibs-common-3.2-36.12.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/lib64kdecore4-3.2-36.12.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/lib64kdecore4-devel-3.2-36.12.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/kdelibs-3.2-36.12.C30mdk.src.rpm

Red Hat Linux (kdelibs)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
Red Hat Desktop (v. 3)
Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Linux Advanced Workstation 2.1 Itanium Processor
https://rhn.redhat.com/

SUSE Linux

SUSE Linux 9.3
x86
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kdelibs3-3.4.0-20.3.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kdelibs3-32bit-9.3-7.1.x86_64.rpm
x86-64
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kdelibs3-3.4.0-20.3.x86_64.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kdelibs3-3.4.0-20.3.src.rpm

SUSE Linux 9.2
x86
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kdelibs3-3.3.0-34.5.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kdelibs3-32bit-9.2-200504081300.x86_64.rpm
x86-64
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kdelibs3-3.3.0-34.5.x86_64.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kdelibs3-3.3.0-34.5.src.rpm

SUSE Linux 9.1
x86
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kdelibs3-3.2.1-44.46.i586.rpm
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/i586/kdelibs3-32bit-9.1-200504071814.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kdelibs3-3.2.1-44.46.src.rpm
x86-64
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kdelibs3-3.2.1-44.46.x86_64.rpm
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kdelibs3-3.2.1-44.46.src.rpm

Identificadores estándar

Propiedad Valor
CVE CAN-2005-0396
BID

Recursos adicionales

KDE Security Advisory 20050316-1
http://www.kde.org/info/security/advisory-20050316-1.txt

Mandrakesoft Security Advisories MDKSA-2005:058
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:058

Red Hat Security Advisory RHSA-2005:325-07
https://rhn.redhat.com/errata/RHSA-2005-325.html

Red Hat Security Advisory RHSA-2005:307-08
https://rhn.redhat.com/errata/RHSA-2005-307.html

SUSE Security Announcement SUSE-SA:2005:022
http://www.novell.com/linux/security/advisories/2005_22_kdelibs3.html

Histórico de versiones

Versión Comentario Data
1.0 Aviso emitido 2005-03-17
1.1 Aviso emitido por Red Hat (RHSA-2005:325-07) 2005-03-24
1.2 Aviso emitido por Red Hat (RHSA-2005:307-08) 2005-04-07
1.3 Aviso emitido por SUSE (SUSE-SA:2005:022) 2005-04-12
Ministerio de Defensa
CNI
CCN
CCN-CERT