KDE dcopidlng: Insecure temporary file creation
Gentoo Linux Security Advisory
||GLSA 200503-14 / dcopidlng
||March 07, 2005
||March 07, 2005: 01
All supported architectures
The dcopidlng script is vulnerable to symlink attacks, potentially allowing
a local user to overwrite arbitrary files.
KDE is a feature-rich graphical desktop environment for Linux and
Unix-like Operating Systems. DCOP is KDE's simple IPC/RPC mechanism.
dcopidlng is a DCOP helper script.
Davide Madrisan has discovered that the dcopidlng script creates
temporary files in a world-writable directory with predictable names.
A local attacker could create symbolic links in the temporary
files directory, pointing to a valid file somewhere on the filesystem.
When dcopidlng is executed, this would result in the file being
overwritten with the rights of the user running the utility, which
could be the root user.
There is no known workaround at this time.
All kdelibs users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose kde-base/kdelibs