{"vuid":"VU#982616","idnumber":"982616","name":"KDE2 kdesu 'keep password' option does not verify socket listener potentially exposing su password","keywords":["KDE2","kdesu","su","socket","kdelibs"],"overview":"kdesu is a interactive interface to the substitute user (su) command for the KDE environment. To pass authentication information, it creates a  file that may be read by unauthorized users.","clean_desc":"kdesu communicates with su using a socket, implemented as a file in /tmp with a predictable name. In this file is placed authenticating information for the effective user that the kdesu user wishes to become (often root).","impact":"By using a symbolic link attack, an attacker may be able to capture usernames and passwords.","resolution":"Apply vendor patches; see the Systems Affected section below.","workarounds":"Creating files in /tmp with appropriate names may block the symbolic link attack, but it may also prevent kdesu from operating properly. It will not be a robust fix.","sysaffected":"","thanks":"Initial information on this vulnerability came from a statement by Caldera Systems.","author":"This document was last modified by Tim Shimeall.","public":["http://www.calderasystems.com/support/security/advisories/CSSA-2001-005.0.txt","http://www.securityfocus.com/bid/2669","http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-046.php3?dis=8.0","http://www.linuxsecurity.com/advisories/redhat_advisory-1335.html","http://www.linuxsecurity.com/advisories/other_advisory-1119.html","http://www.linuxsecurity.com/advisories/suse_advisory-1113.html"],"cveids":["CVE-2001-0178"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-01-25T01:22:42Z","publicdate":"2001-01-23T00:00:00Z","datefirstpublished":"2001-05-17T18:37:34Z","dateupdated":"2001-08-01T18:28:13Z","revision":11,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"14","cam_exploitation":"0","cam_internetinfrastructure":"2","cam_population":"10","cam_impact":"18","cam_easeofexploitation":"15","cam_attackeraccessrequired":"10","cam_scorecurrent":"8.1","cam_scorecurrentwidelyknown":"11.1375","cam_scorecurrentwidelyknownexploited":"21.2625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.1,"vulnote":null}