FreeBSD : kpopup -- local root exploit and local denial of service (1613db79-8e52-11da-8426-000fea0a9611)

High Nessus Plugin ID 21390


The remote FreeBSD host is missing a security-related update.


Mitre CVE reports :

Format string vulnerability in main.cpp in kpopup 0.9.1-0.9.5pre2 allows local users to cause a denial of service (segmentation fault) and possibly execute arbitrary code via format string specifiers in command line arguments.

misc.cpp in KPopup 0.9.1 trusts the PATH variable when executing killall, which allows local users to elevate their privileges by modifying the PATH variable to reference a malicious killall program.

SecurityFocus credits 'b0f' [email protected]


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 21390

File Name: freebsd_pkg_1613db798e5211da8426000fea0a9611.nasl

Version: $Revision: 1.13 $

Type: local

Published: 2006/05/13

Modified: 2013/06/21

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.2

Temporal Score: 6.5

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:W/RC:ND

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:kpopup, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2006/02/07

Vulnerability Publication Date: 2003/10/28

Reference Information

CVE: CVE-2003-1167, CVE-2003-1170

BID: 8915, 8918