|Category:||Red Hat Local Security Checks|
|Title:||RedHat Security Advisory RHSA-2005:175|
The remote host is missing updates announced in
The kdenetwork packages contain a collection of networking applications for
the K Desktop Environment.
A bug was found in the way kppp handles privileged file descriptors. A
malicious local user could make use of this flaw to modify the /etc/hosts
or /etc/resolv.conf files, which could be used to spoof domain information.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2005-0205 to this issue.
Please note that the default installation of kppp on Red Hat Enterprise
Linux uses consolehelper and is not vulnerable to this issue. However, the
kppp FAQ provides instructions for removing consolehelper and running kppp
suid root, which is a vulnerable configuration.
Users of kdenetwork should upgrade to these updated packages, which contain
a backported patch, and are not vulnerable to this issue.
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date
Risk factor : Medium
Common Vulnerability Exposure (CVE) ID: CVE-2005-0205|
Conectiva Linux advisory: CLA-2005:934
Debian Security Information: DSA-692 (Google Search)
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.