Bug 24298 - startkde: vulnerable to symlink attack
Summary: startkde: vulnerable to symlink attack
Status: CLOSED RAWHIDE
Alias: None
Product: Red Hat Linux
Classification: Retired
Component: kdebase   
(Show other bugs)
Version: 7.1
Hardware: i386
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Bernhard Rosenkraenzer
QA Contact: Aaron Brown
URL:
Whiteboard: Florence Beta-3
Keywords: Security
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2001-01-18 17:33 UTC by Gerald Teschl
Modified: 2007-04-18 16:30 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2001-01-18 23:55:39 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

Description Gerald Teschl 2001-01-18 17:33:20 UTC
The following code can be easily exploited to destroy arbitrary files
owned by the user who starts kde!
------------------------
testfile=KDE_$$.testfile
 
if ! echo TEST_TEXT >/tmp/$testfile 2>/dev/null ; then
    echo "Have no write permissions for /tmp"
    exit 1
fi
rm -f /tmp/$testfile
--------------------------

Comment 1 Glen Foster 2001-01-18 21:26:52 UTC
This defect is considered MUST-FIX for Florence Beta-3

Comment 2 Bernhard Rosenkraenzer 2001-01-18 23:55:36 UTC
Fixed in 2.0.20010119-1



Note You need to log in before you can comment on or make changes to this bug.