CVE-2006-2449

KDE Display Manager (KDM) in KDE 3.2.0 up to 3.5.3 allows local users to read arbitrary files via a symlink attack related to the session type for login.
References
Link Resource
http://secunia.com/advisories/20602 Vendor Advisory
http://secunia.com/advisories/20660 Vendor Advisory
http://secunia.com/advisories/20674 Vendor Advisory
http://secunia.com/advisories/20702 Vendor Advisory
http://secunia.com/advisories/20785 Vendor Advisory
http://secunia.com/advisories/20869 Vendor Advisory
http://secunia.com/advisories/20890 Vendor Advisory
http://secunia.com/advisories/21662 Vendor Advisory
http://securitytracker.com/id?1016297
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.444467
http://www.debian.org/security/2006/dsa-1156 Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200606-23.xml
http://www.kde.org/info/security/advisory-20060614-1.txt Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:105
http://www.mandriva.com/security/advisories?name=MDKSA-2006:106
http://www.novell.com/linux/security/advisories/2006_39_kdm.html Vendor Advisory
http://www.osvdb.org/26511
http://www.redhat.com/support/errata/RHSA-2006-0548.html Patch Vendor Advisory
http://www.securityfocus.com/archive/1/437133/100/0/threaded
http://www.securityfocus.com/archive/1/437322/100/0/threaded
http://www.securityfocus.com/bid/18431
http://www.vupen.com/english/advisories/2006/2355
https://exchange.xforce.ibmcloud.com/vulnerabilities/27181
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9844
https://usn.ubuntu.com/301-1/
http://secunia.com/advisories/20602 Vendor Advisory
http://secunia.com/advisories/20660 Vendor Advisory
http://secunia.com/advisories/20674 Vendor Advisory
http://secunia.com/advisories/20702 Vendor Advisory
http://secunia.com/advisories/20785 Vendor Advisory
http://secunia.com/advisories/20869 Vendor Advisory
http://secunia.com/advisories/20890 Vendor Advisory
http://secunia.com/advisories/21662 Vendor Advisory
http://securitytracker.com/id?1016297
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.444467
http://www.debian.org/security/2006/dsa-1156 Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200606-23.xml
http://www.kde.org/info/security/advisory-20060614-1.txt Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:105
http://www.mandriva.com/security/advisories?name=MDKSA-2006:106
http://www.novell.com/linux/security/advisories/2006_39_kdm.html Vendor Advisory
http://www.osvdb.org/26511
http://www.redhat.com/support/errata/RHSA-2006-0548.html Patch Vendor Advisory
http://www.securityfocus.com/archive/1/437133/100/0/threaded
http://www.securityfocus.com/archive/1/437322/100/0/threaded
http://www.securityfocus.com/bid/18431
http://www.vupen.com/english/advisories/2006/2355
https://exchange.xforce.ibmcloud.com/vulnerabilities/27181
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9844
https://usn.ubuntu.com/301-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.4:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.4.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.4.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.4.3:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.5:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.5.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.5.3:*:*:*:*:*:*:*

History

No history.

Information

Published : 2006-06-15 10:02

Updated : 2025-04-03 01:03


NVD link : CVE-2006-2449

Mitre link : CVE-2006-2449

CVE.ORG link : CVE-2006-2449


JSON object : View

Products Affected

kde

  • kde