Bug 151373

Summary: CAN-2005-0396 kdelibs DCOP DoS
Product: Red Hat Enterprise Linux 3 Reporter: Mark J. Cox <mjc>
Component: kdelibsAssignee: Than Ngo <than>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: 3.0CC: mjc, security-response-team, than
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=moderate,embargo=20050316,source=vendorsec
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2005-04-06 17:54:35 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Mark J. Cox 2005-03-17 12:46:10 UTC
+++ This bug was initially created as a clone of Bug #150090 +++

Sebastian Krahmer of the SUSE LINUX Security Team reported a local denial of
service vulnerability in KDE's Desktop Communication Protocol (DCOP) daemon
better known as dcopserver.

A local user can lock up the dcopserver of arbitrary other users on the same
machine by stalling the DCOP authentication process.

Although it is not possible to by pass the authentication process this way, it
can cause a significant reduction in desktop functionality for the affected users.

Comment 1 Mark J. Cox 2005-03-17 12:46:52 UTC
        CAN-2005-0396 Affects: RHEL2.1 [#151373]
        CAN-2005-0396 Probably Affects: RHEL3 [#151373]


Comment 2 Josh Bressers 2005-04-06 17:54:36 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2005-307.html