Back to list
[KDE Security Advisory] KDM symlink attack vulnerability
Jun 14 2006 06:30PM
Dirk Mueller (mueller kde org)
KDE Security Advisory: KDM symlink attack vulnerability
Original Release Date: 2006-06-14
1. Systems affected:
KDM as shipped with KDE 3.2.0 up to including 3.5.3. KDE 3.1.x and
older and newer versions than KDE 3.5.3 are not affected.
KDM allows the user to select the session type for login. This
setting is permanently stored in the user home directory. By
using a symlink attack, KDM can be tricked into allowing the
user to read file content that would otherwise be unreadable
to this particular user. This vulnerability was discovered
and reported by Ludwig Nussel.
KDM might allow a normal user to read the content of /etc/shadow
or other files, which allows compromising the privacy of another
user or even the security of the whole system.
Source code patches have been made available which fix these
vulnerabilities. Contact your OS vendor / binary package provider
for information about how to obtain updated binary packages.
A patch for KDE 3.4.0 - KDE 3.5.3 is available from
A patch for KDE 3.3.x is available from
A patch for KDE 3.2.x is available from
[ reply ]
Copyright 2010, SecurityFocus