Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2003-0690
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
KDM in KDE 3.1.3 and earlier does not verify whether the pam_setcred function call succeeds, which may allow attackers to gain root privileges by triggering error conditions within PAM modules, as demonstrated in certain configurations of the MIT pam_krb5 module.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
KDE KDM PAM模块PAM_SetCred权限提升漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
KDE是一款免费开放源代码X桌面管理程序,设计用于Unix和Linux操作系统。 KDE Display Manager当结合使用PAM验证模块时存在问题,远程攻击者可以利用这个漏洞未授权访问系统。 KDM在处理pam_setcred()函数调用时存在问题,部分配置下MIT pam_krb5模块会导致pam_setcred()调用失败而使会话依旧处于存活状态,普通用户拥有合法帐户名和密码可以以ROOT权限访问系统。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2003-0690
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2003-0690
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2003-0690

No comments yet


Leave a comment