----------------------------------------------------------------------


Use WSUS to deploy 3rd party patches

Public BETA
http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/


----------------------------------------------------------------------

TITLE:
KDE KRunner Lock Module Race Condition Weakness

SECUNIA ADVISORY ID:
SA38600

VERIFY ADVISORY:
http://secunia.com/advisories/38600/

DESCRIPTION:
A weakness has been reported in KDE, which can be exploited by
malicious people with physical access to bypass certain security
restrictions.

The weakness is caused due to a race condition within the KRunner
lock module when forking password validating processes, which can be
exploited to e.g. cause a hang or potentially cause a crash, which
can lead to e.g. a screen locked with KScreenSaver to be unlocked.

The weakness is reported in KDE 4.4.0. Other versions are not
affected.

SOLUTION:
Apply patch:
http://websvn.kde.org/?view=rev&revision=1089241

PROVIDED AND/OR DISCOVERED BY:
Reported by various persons.

ORIGINAL ADVISORY:
http://www.kde.org/info/security/advisory-20100217-1.txt
http://bugs.kde.org/show_bug.cgi?id=217882

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------