Gentoo Logo

Smb4K: Multiple vulnerabilities


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200703-09 / smb4k
Release Date March 09, 2007
Latest Revision March 09, 2007: 01
Impact high
Exploitable local
Package Vulnerable versions Unaffected versions Architecture(s)
net-misc/smb4k < 0.6.10a >= 0.6.10a All supported architectures

Related bugreports: #156152


Multiple vulnerabilities have been identified in Smb4K.

2.  Impact Information


Smb4K is a SMB/CIFS (Windows) share browser for KDE.


Kees Cook of the Ubuntu Security Team has identified multiple vulnerabilities in Smb4K.

  • The writeFile() function of smb4k/core/smb4kfileio.cpp makes insecure usage of temporary files.
  • The writeFile() function also stores the contents of the sudoers file with incorrect permissions, allowing for the file's contents to be world-readable.
  • The createLockFile() and removeLockFile() functions improperly handle lock files, possibly allowing for a race condition in file handling.
  • The smb4k_kill utility distributed with Smb4K allows any user in the sudoers group to kill any process on the system.
  • Lastly, there is the potential for multiple stack overflows when any Smb4K utility is used with the sudo command.


A local attacker could gain unauthorized access to arbitrary files via numerous attack vectors. In some cases to obtain this unauthorized access, an attacker would have to be a member of the sudoers list.

3.  Resolution Information


There is no known workaround at this time.


All Smb4K users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/smb4k-0.6.10a"

4.  References


Page updated March 09, 2007

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.