Vulnerability Bulletins |
Acceso a nombres de usuario y contraseñas SIP en Kphone |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Confidencialidad |
Dificulty | Principiante |
Required attacker level | Acceso remoto con cuenta |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software | kphone 4.2 |
Description |
|
Se ha descubierto una vulnerabilidad en kphone 4.2. La vulnerabilidad reside en que el fichero ".qt/kphonerc" se crea con permisos de lectura para cualquier usuario. Un atacante local podría obtener los nombres de usuario y las contraseñas SIP. |
|
Solution |
|
Actualización de software Debian Debian Linux 3.1 Source http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1.dsc http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1.diff.gz http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_alpha.deb AMD64 http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_amd64.deb ARM http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_ia64.deb HP Precision http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/k/kphone/kphone_4.1.0-2sarge1_sparc.deb Mandriva Linux Mandrivalinux 2006 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/RPMS/kphone-4.2-5.1.20060mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/kphone-4.2-5.1.20060mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/RPMS/kphone-4.2-5.1.20060mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/SRPMS/kphone-4.2-5.1.20060mdk.src.rpm |
|
Standar resources |
|
Property | Value |
CVE | CVE-2006-2442 |
BID | |
Other resources |
|
Debian Security Advisory (DSA 1062-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00147.html Mandriva Security Advisory MDKSA-2006:089 http://www.mandriva.com/security/advisories?name=MDKSA-2006:089 |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2006-05-22 |
1.1 | Mandriva Security Advisory (MDKSA-2006:089) | 2006-05-25 |