FreeBSD : kpopup -- local root exploit and local denial of service (1613db79-8e52-11da-8426-000fea0a9611)

high Nessus Plugin ID 21390

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Mitre CVE reports :

Format string vulnerability in main.cpp in kpopup 0.9.1-0.9.5pre2 allows local users to cause a denial of service (segmentation fault) and possibly execute arbitrary code via format string specifiers in command line arguments.

misc.cpp in KPopup 0.9.1 trusts the PATH variable when executing killall, which allows local users to elevate their privileges by modifying the PATH variable to reference a malicious killall program.

SecurityFocus credits 'b0f' [email protected]

Solution

Update the affected package.

See Also

https://www.securityfocus.com/archive/1/342736

http://www.henschelsoft.de/kpopup_en.html

http://www.nessus.org/u?5af21d82

Plugin Details

Severity: High

ID: 21390

File Name: freebsd_pkg_1613db798e5211da8426000fea0a9611.nasl

Version: 1.17

Type: local

Published: 5/13/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.5

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:kpopup, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/7/2006

Vulnerability Publication Date: 10/28/2003

Reference Information

CVE: CVE-2003-1167, CVE-2003-1170

BID: 8915, 8918