rPath Linux 1 - Local Deterministic Denial of Service

Risk: Low
Local: Yes
Remote: No
CWE: CWE-noinfo

CVSS Base Score: 4.7/10
Impact Subscore: 6.9/10
Exploitability Subscore: 3.4/10
Exploit range: Local
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: None
Availability impact: Complete

rPath Security Advisory: 2007-0268-1 Published: 2007-12-17 Products: rPath Linux 1 Rating: Major Exposure Level Classification: Local Deterministic Denial of Service Updated Versions: kdebase=conary.rpath.com@rpl:1/3.4.2-3.15-1 rPath Issue Tracking System: https://issues.rpath.com/browse/RPL-1992 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5963 Description: Previous versions of the kdebase package are vulnerable to Denials of Service in which a local user can render KDM unusable for logins by any user or cause KDM to exceed system resource limits. In its default configuration, rPath Linux 1 is not vulnerable to the Denial of Service against KDM logins. http://wiki.rpath.com/Advisories:rPSA-2007-0268 Copyright 2007 rPath, Inc. This file is distributed under the terms of the MIT License. A copy is available at http://www.rpath.com/permanent/mit-license.html

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com


Back to Top