[prev in list] [next in list] [prev in thread] [next in thread] 

List:       kde-bugs-dist
Subject:    Bug#3113: marked as done (root compromise)
From:       owner () bugs ! kde ! org (Stephan Kulow)
Date:       2000-04-28 22:33:01
[Download RAW message or body]

Your message dated Sat, 29 Apr 2000 00:25:05 +0200
with message-id <390A0FC1.3D462A23@kde.org>
and subject line Bug#3113: root compromise
has caused the attached bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I'm
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Stephan Kulow
(administrator, KDE bugs database)

Received: (at submit) by bugs.kde.org; 28 Apr 2100 21:51:30 +0000
From Marc_Suttle@NAI.com Fri Apr 28 23:51:29 2000
Received: from relay2.nai.com ([161.69.3.67]:14506 "EHLO relay2.nai.com")
        by max.tat.physik.uni-tuebingen.de with ESMTP id <S743027AbQD1VvN>;
        Fri, 28 Apr 2000 23:51:13 +0200
Received: from webshield2.na.nai.com (webshield2.nai.com [161.69.3.73])
        by relay2.nai.com (8.9.3/8.9.3) with SMTP id OAA29160
        for <submit@bugs.kde.org>; Fri, 28 Apr 2000 14:50:47 -0700 (PDT)
Received: FROM ca-ex-bridge1.nai.com BY webshield2.na.nai.com ; Fri Apr 28 14:53:23 2000 -0700
Received: by na-ex-bridge1.nai.com with Internet Mail Service (5.5.2650.21)
        id <J58MZNPK>; Fri, 28 Apr 2000 14:48:26 -0700
Message-ID: <6084E7846673D311AC87009027AA6AA701C5FCB6@tx-exchange2.nai.com>
From:   "Suttle, Marc" <Marc_Suttle@NAI.com>
To:     submit@bugs.kde.org
Subject: root compromise
Date:   Fri, 28 Apr 2000 12:09:37 -0700
Importance: high
X-Priority: 1
Return-Receipt-To: "Suttle, Marc" <Marc_Suttle@NAI.com>
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: text/plain;
        charset="iso-8859-1"
Return-Path: <Marc_Suttle@NAI.com>
X-Orcpt: rfc822;submit@bugs.kde.org

package-kde screensaver
version-various

when a user is logged in to kde and the password protected screen saver
kicks in the is a combination of key sequences to bypass this and get into
the shell.....combination as follows:

hold down ctrl-alt-f12
then hit alt-f1 (or whatever terminal is being used for kde f2, f3,
whatever)
when at the kde initialization screen hit ctrl-z and you are logged on to
the shell with whatever user started x including root!

I suggest making some kind of lock on this, a malicious user could use this
to access root or super-user and create a backdorr in about 3 minutes or
less

I am using SuSE 6.3....this has been tested on kde with redhat 6.2 as well
as suse 6.3.


please if you can let me know if this is a new bug or has already been
discovered

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic