Bug 287311 - (CVE-2007-4569) CVE-2007-4569 kdm password-less login vulnerability
CVE-2007-4569 kdm password-less login vulnerability
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 290851 290861 290871 290881 299731 299741
  Show dependency treegraph
Reported: 2007-09-12 02:09 EDT by Tomas Hoger
Modified: 2018-08-15 15:27 EDT (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2008-01-16 12:24:24 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
Upstream patch: post-3.5.7-kdebase-kdm.diff (1.57 KB, patch)
2007-09-12 02:11 EDT, Tomas Hoger
no flags Details | Diff

External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2007:0905 normal SHIPPED_LIVE Moderate: kdebase security update 2008-01-08 12:50:28 EST

  None (edit)
Description Tomas Hoger 2007-09-12 02:09:34 EDT
Dirk Mueller from KDE project has provided us with preview of upcoming KDE
security advisory for kdm:

KDE Security Advisory: KDM passwordless login vulnerability
Original Release Date: 2007-09-19
URL: http://www.kde.org/info/security/advisory-20070919-1.txt

0. References

1. Systems affected:

	KDM as shipped with KDE 3.3.0 up to including 3.5.7. KDE 3.2.x and
	older and newer versions than KDE 3.5.7 are not affected. 

2. Overview:

	KDM can be tricked into performing a password-less login even for
	accounts with a password set under certain circumstances. It
        requires autologin to be configured and 
        "shutdown with password" enabled.

        This vulnerability was discovered and reported by C. Huijgen.
3. Impact:

	KDM might allow a normal user to login as another user or even
	root without properly supplying login credentials.

4. Solution:

        Source code patches have been made available which fix these
        vulnerabilities. Contact your OS vendor / binary package provider
        for information about how to obtain updated binary packages.

5. Patch:

        A patch for KDE 3.3.0 - KDE 3.5.7 is available from
        ftp://ftp.kde.org/pub/kde/security_patches :

	ee6c57046902c5b5a32a4699558baafc  post-3.5.7-kdebase-kdm.diff
Comment 1 Tomas Hoger 2007-09-12 02:11:10 EDT
Created attachment 193281 [details]
Upstream patch: post-3.5.7-kdebase-kdm.diff
Comment 8 Tomas Hoger 2007-09-12 12:09:22 EDT
Correct reporter name should be: 'Kees Huijgen'
Comment 10 Tomas Hoger 2007-09-21 02:37:27 EDT
Issue is public now, lifting embargo:

Comment 16 Red Hat Product Security 2008-01-16 12:24:24 EST
This issue was addressed in:

Red Hat Enterprise Linux:


Note You need to log in before you can comment on or make changes to this bug.