blob: c31dcdbb2536f743e5a6ab672d547a7e3371f31c (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
|
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200408-13">
<title>kdebase, kdelibs: Multiple security issues</title>
<synopsis>
KDE contains three security issues that can allow an attacker to compromise
system accounts, cause a Denial of Service, or spoof websites via frame
injection.
</synopsis>
<product type="ebuild">kde, kdebase, kdelibs</product>
<announced>2004-08-12</announced>
<revised count="01">2004-08-12</revised>
<bug>60068</bug>
<access>remote and local</access>
<affected>
<package name="kde-base/kdebase" auto="yes" arch="*">
<unaffected range="ge">3.2.3-r1</unaffected>
<vulnerable range="lt">3.2.3-r1</vulnerable>
</package>
<package name="kde-base/kdelibs" auto="yes" arch="*">
<unaffected range="ge">3.2.3-r1</unaffected>
<vulnerable range="lt">3.2.3-r1</vulnerable>
</package>
</affected>
<background>
<p>
KDE is a powerful Free Software graphical desktop environment for Linux and
Unix-like Operating Systems.
</p>
</background>
<description>
<p>
KDE contains three security issues:
</p>
<ul>
<li>Insecure handling of temporary files when running KDE applications
outside of the KDE environment</li>
<li>DCOPServer creates temporary files in an insecure manner</li>
<li>The Konqueror browser allows websites to load webpages into a target
frame of any other open frame-based webpage</li>
</ul>
</description>
<impact type="normal">
<p>
An attacker could exploit these vulnerabilities to create or overwrite
files with the permissions of another user, compromise the account of users
running a KDE application and insert arbitrary frames into an otherwise
trusted webpage.
</p>
</impact>
<workaround>
<p>
There is no known workaround at this time. All users are encouraged to
upgrade to the latest available version of kdebase.
</p>
</workaround>
<resolution>
<p>
All KDE users should upgrade to the latest versions of kdelibs and kdebase:
</p>
<code>
# emerge sync
# emerge -pv ">=kde-base/kdebase-3.2.3-r1"
# emerge ">=kde-base/kdebase-3.2.3-r1"
# emerge -pv ">=kde-base/kdelibs-3.2.3-r1"
# emerge ">=kde-base/kdelibs-3.2.3-r1"</code>
</resolution>
<references>
<uri link="https://www.kde.org/info/security/advisory-20040811-1.txt">KDE Advisory: Temporary Directory Vulnerability</uri>
<uri link="https://www.kde.org/info/security/advisory-20040811-2.txt">KDE Advisory: DCOPServer Temporary Filename Vulnerability</uri>
<uri link="https://www.kde.org/info/security/advisory-20040811-3.txt">KDE Advisory: Konqueror Frame Injection Vulnerability</uri>
</references>
<metadata tag="submitter" timestamp="2004-08-11T17:47:27Z">
jaervosz
</metadata>
</glsa>
|