Skip to main content

CVE-1999-0780: KDE klock allows local users to kill arbitrary processes by specifying an arbitrary PID in the .kss.

Medium
VulnerabilityCVE-1999-0780cve-1999-0780
Published: Wed Nov 18 1998 (11/18/1998, 05:00:00 UTC)
Source: NVD
Vendor/Project: freebsd
Product: freebsd

Description

KDE klock allows local users to kill arbitrary processes by specifying an arbitrary PID in the .kss.pid file.

AI-Powered Analysis

AILast updated: 07/01/2025, 21:26:35 UTC

Technical Analysis

CVE-1999-0780 is a medium severity local vulnerability affecting the KDE klock utility on FreeBSD systems, specifically versions 6.2, 1.0, and 2.6.20.1. The vulnerability arises because klock allows local users to specify an arbitrary process ID (PID) in the .kss.pid file, which klock then uses to kill processes. This means that any local user with access to the system can terminate arbitrary processes owned by other users or the system by manipulating the .kss.pid file. The attack vector is local (AV:L), requires low attack complexity (AC:L), and does not require authentication (Au:N). The impact affects confidentiality, integrity, and availability (C:P/I:P/A:P), as killing arbitrary processes can disrupt system operations, potentially leading to denial of service or privilege escalation scenarios if critical processes are terminated. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the vulnerability (published in 1998) and the affected versions, it primarily impacts legacy FreeBSD systems running KDE klock, which may still be in use in some specialized or legacy environments.

Potential Impact

For European organizations, the impact of this vulnerability is primarily relevant to those running legacy FreeBSD systems with KDE klock installed. The ability for local users to kill arbitrary processes can lead to denial of service conditions, disruption of critical services, and potential escalation of privileges if attackers can terminate security or monitoring processes. This could affect operational continuity and data integrity in environments where FreeBSD is used for specialized applications, research, or infrastructure components. However, the risk is mitigated by the requirement for local access, meaning remote exploitation is not possible. Organizations with strict access controls and user privilege management will reduce the likelihood of exploitation. Nonetheless, in multi-user environments or shared systems, this vulnerability could be exploited by malicious insiders or unauthorized users who gain local access.

Mitigation Recommendations

Given that no official patch is available, European organizations should implement the following specific mitigations: 1) Restrict local user access to systems running vulnerable versions of FreeBSD with KDE klock installed, ensuring only trusted users have shell or console access. 2) Employ strict file permission controls on the .kss.pid file and related directories to prevent unauthorized modification. 3) Monitor system logs and process terminations for unusual activity indicative of exploitation attempts. 4) Consider disabling or uninstalling KDE klock if it is not essential to operations, especially on legacy systems. 5) Where possible, upgrade to newer versions of FreeBSD and KDE components that do not contain this vulnerability. 6) Implement mandatory access controls (e.g., SELinux, AppArmor) or sandboxing to limit the ability of local users to affect critical processes. 7) Conduct regular audits of user privileges and system configurations to detect and remediate potential weaknesses.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7deb2e

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 9:26:35 PM

Last updated: 8/16/2025, 4:47:56 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats