Home > Security > Advisories

Advisories

Mandriva Advisories

Package name kdm
Date March 20th, 2002
Advisory ID MDKSA-2002:025
Affected versions 7.1, 7.2, 8.0, CS1.0
Synopsis Instructions correcting insecure configuration of kdm

Problem Description

A problem was discovered with the default configuration of the kdm
display manager in Mandrake Linux. By default, it allows XDMCP
connections from any host, which can be used to obtain a login screen
on your system remotely. This can be used to get a list of users on
that host, as displayed by kdm. It can also be used to circumvent
access control mechanisms such as tcpwrappers and root login
restrictions on the console and via remote.

Solution:

To disable remote connections, edit the /etc/X11/xdm/Xaccess file and
change the following two lines:

* #any host can get a login window
* CHOOSER BROADCAST #any indirect host can get a chooser

to:



Please note that Mandrake Linux 8.1 and 8.2 are not vulnerable to this
as newer versions of kdm have a configuration option in the
/usr/share/config/kdm/kdmrc file which explicitly have XDMCP support
disabled.

Also please note that this is only valid if you are running kdm.

Updated Packages


References

http://www.kb.cert.org/vuls/id/634847
http://www.procheckup.com/security_info/vuln_pr0208.html

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.