Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   KDocker Vendors:
KDocker File Access Flaw May Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1011688
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Updated:  Oct 16 2004
Original Entry Date:  Oct 14 2004
Impact:   Execution of arbitrary code via local system, Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): prior to 0.9
Description:   A vulnerability was reported in KDocker. A local user may be able to gain elevated privileges.

The vendor reported that when more than one instance of KDocker is invoked, the software creates a temporary file (in '/tmp'), writes the arguments to the temporary file, and sends an XClientMessage to the original instance. Then, the original instance reads the temporary file and executes the contents.

A local user can create a file in the temporary directory and send an XClientMessage to the instance of KDocker, causing KDocker to read the temporary file and execute the specified application with the privileges of the KDocker process. As a result, a local user may be able to gain the privileges of the KDocker process. To exploit this, the local user must be able to initiate an authenticated X session.

Impact:   A local user may be able to gain elevated privileges.
Solution:   The vendor has released a fixed version (0.9), available at:

Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC