exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

KDE Security Advisory 2004-01-14.1

KDE Security Advisory 2004-01-14.1
Posted Jan 14, 2004
Authored by KDE Desktop | Site kde.org

KDE Security Advisory: All versions of kdepim, as distributed with KDE versions 3.1.0 through 3.1.4 inclusive, have a buffer overflow in the file information reader of VCF files.

tags | advisory, overflow
SHA-256 | 4bc3105bfc840db454199fc6055e58f5d0bb7a20944a902bb13c82ac0a4a15a3

KDE Security Advisory 2004-01-14.1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



KDE Security Advisory: VCF file information reader vulnerability
Original Release Date: 2004-01-14
URL: http://www.kde.org/info/security/advisory-20040114-1.txt

0. References


1. Systems affected:

All versions of kdepim as distributed with KDE versions 3.1.0
through 3.1.4 inclusive.


2. Overview:

The KDE team has found a buffer overflow in the file
information reader of VCF files.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CAN-2003-0988 to this issue.


3. Impact:

A carefully crafted .VCF file potentially enables local attackers
to compromise the privacy of a victim's data or execute
arbitrary commands with the victim's privileges.

By default, file information reading is disabled for remote files.
However, if previews are enabled for remote files, remote
attackers may be able to compromise the victim's account.


4. Solution:

As a workaround, remove the kfile_vcf.desktop file.

Users of KDE 3.1.x are advised to upgrade to KDE 3.1.5. A patch for
KDE 3.1.4 is available for users who are unable to upgrade to
KDE 3.1.5.


5. Patch:

A patch for KDE 3.1.4 is available from
ftp://ftp.kde.org/pub/kde/security_patches :

26469366cc393e50ff80d6dca8c74c58 post-3.1.4-kdepim-kfile-plugins.diff


6. Time line and credits:

15/12/2003 KDE developer Dirk Mueller discovers vulnerability.
15/12/2003 Patches for the vulnerability are applied to CVS and
release preparations for KDE 3.1.5 are started.

14/01/2004 Public advisory.


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQFABUiwvsXr+iuy1UoRAmf2AKC4JiwDwfDXGME6SZkTF8sVqginEgCgisjC
MLH9/a8f1cFs0iJ2ebdiShM=
=Uoit
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close