Linux Security
Linux Security
Linux Security

Debian: kdesdk multiple vulnerabilities

Date 23 Jan 2003
Posted By LinuxSecurity Advisories
The KDE team discovered several vulnerabilities in the K Desktop Environment.

- --------------------------------------------------------------------------
Debian Security Advisory DSA 239-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
January 23rd, 2003             
- --------------------------------------------------------------------------

Package        : kdesdk
Vulnerability  : several
Problem-type   : local, remote
Debian-specific: no
CVE Id         : CAN-2002-1393

The KDE team discovered several vulnerabilities in the K Desktop
Environment.  In some instances KDE fails to properly quote parameters
of instructions passed to a command shell for execution.  These
parameters may incorporate data such as URLs, filenames and e-mail
addresses, and this data may be provided remotely to a victim in an
e-mail, a webpage or files on a network filesystem or other untrusted

By carefully crafting such data an attacker might be able to execute
arbitary commands on a vulnerable sytem using the victim's account and
privileges.  The KDE Project is not aware of any existing exploits of
these vulnerabilities.  The patches also provide better safe guards
and check data from untrusted sources more strictly in multiple

For the current stable distribution (woody), these problems have been fixed
in version 2.2.2-3.2.

The old stable distribution (potato) does not contain KDE packages.

For the unstable distribution (sid), these problems will most probably
not be fixed but new packages for KDE 3.1 for sid are expected for
this year.

We recommend that you upgrade your KDE packages.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:
      Size/MD5 checksum:      809 1e72a255b00079ba8e293a4ceb1c8eb3
      Size/MD5 checksum:     2645 1f41391569ee52599dc843687a03181e
      Size/MD5 checksum:  1360120 27bc6f7baf89e63fc6913772769920df

  Architecture independent components:
      Size/MD5 checksum:   250626 a8e193b6c246f9038bd0b1634e8628c0
      Size/MD5 checksum:     5836 d426f27006ee16b366e7aea58535ab3f
      Size/MD5 checksum:   126968 30f7976922e912f7ced3b4c5252241df
      Size/MD5 checksum:    66716 1c1b8276651620280b31cf892a10a6e7

  Alpha architecture:
      Size/MD5 checksum:   859876 2d1f134832246f016708c9b5869b2e6b
      Size/MD5 checksum:    21394 4bccd516498a581fae81f4f0a86a91c9
      Size/MD5 checksum:     4812 8003ab13861e310bcc912fccc8fcd2ca
      Size/MD5 checksum:    27588 891cb9ed18b7fcbf0dbcd6d81777d04a
      Size/MD5 checksum:    63782 972cec3713037b485e993dddf0b4d38a
      Size/MD5 checksum:    31528 de61d755227fbc982af96b3d1823f238
      Size/MD5 checksum:    14632 528754318b469f61e61bd239576c629c
      Size/MD5 checksum:   646068 8215138bec95fce13579ddeb57835363

  ARM architecture:
      Size/MD5 checksum:   774294 7be484e4e531bada235675670656f7ad
      Size/MD5 checksum:    21392 a106a49607929471e8d0fbfda42b7302
      Size/MD5 checksum:     4814 c659f7dba60b8d00ff8f6e9c0d7f1d87
      Size/MD5 checksum:    25996 2fc418708a8c880c5aecc45cbde1c2ec
      Size/MD5 checksum:    58904 34211e1af64b8a80aa39149480f07c74
      Size/MD5 checksum:    28198 c4f819f1d31987346a979fab5fc8ec2e
      Size/MD5 checksum:    13276 e1a80773b018de47fa2a4247743cb5e5
      Size/MD5 checksum:   823442 679a0cc8b4716ea12a3431af11c16697

  Intel IA-32 architecture:
      Size/MD5 checksum:   771636 398d372af4149eba47689f9b36db7780
      Size/MD5 checksum:    21390 4af236cb7cbfb97be9650a5bb0912247
      Size/MD5 checksum:     4812 c3b559f9f7429653181503c179f1f0e4
      Size/MD5 checksum:    27030 ea6665b84e3e12bf1ea11ce30e086d8a
      Size/MD5 checksum:    52800 068d88ee6551f11a48f51d3973787a39
      Size/MD5 checksum:    26852 dca10d6aa7f98c468e983e60b1f4b452
      Size/MD5 checksum:    13280 8611af32043773a83bb1cf59bf45c859
      Size/MD5 checksum:   646918 8cab3553cb420581e5d5d61dc6bb6c32

  Intel IA-64 architecture:
      Size/MD5 checksum:  1081164 adc303bb20b873e1d1111e4bff4b0035
      Size/MD5 checksum:    21398 6adf6c79dcbf70931c1865b649a7cdcb
      Size/MD5 checksum:     4812 3cc47238e4fc2a13f2f54e617e646d00
      Size/MD5 checksum:    29356 b121017c5ed894da3aa55ba8e39c2ba3
      Size/MD5 checksum:    82626 123f528b9eed10394461baa30243ee51
      Size/MD5 checksum:    33162 26c22978b33eeda9cae0d15641302a1e
      Size/MD5 checksum:    15300 d6b7c27627086e1b5cef53959af9731c
      Size/MD5 checksum:   925860 d4ce81bf2af95fe33100df103c21dc7e

  HP Precision architecture:
      Size/MD5 checksum:   889318 bcff53bd4619d49193abe277c09d1506
      Size/MD5 checksum:    21398 5ce6c4922f8c176b969a9c1a96bee298
      Size/MD5 checksum:     4810 5ab1aa6a25c4939e9c9c8abe65a17d7c
      Size/MD5 checksum:    28136 159b6cc8977f5b45cad85e97e9ce117c
      Size/MD5 checksum:    66134 ac364b2798f4b2307a51529d1bb600db
      Size/MD5 checksum:    32966 22ee0f939f8922c25517823214b193bf
      Size/MD5 checksum:    14020 c16c6dde35ed450d4142cd06527481cd
      Size/MD5 checksum:   606434 f71003608b1e050c050069f4d17c226a

  Motorola 680x0 architecture:
      Size/MD5 checksum:   755554 8a29c63753913e33ebde86dcf2d6d392
      Size/MD5 checksum:    21412 da1079065eebd18a353a66a61cd4dee1
      Size/MD5 checksum:     4824 8f8a296e9cb9809992ee775afbf3fd18
      Size/MD5 checksum:    27516 5d50b2f558e0c762ee5c2dfc99fa7f6e
      Size/MD5 checksum:    49072 fbe18a9d85c5f8412b73d6b525fc9739
      Size/MD5 checksum:    30292 4bf09fa1bd8cc6de9c16159ecd3ae589
      Size/MD5 checksum:    13366 438135879b2780246d418743f9a9fd3d
      Size/MD5 checksum:   572830 43978d2e9e5361e5961e8ff54063faa6

  Big endian MIPS architecture:
      Size/MD5 checksum:   732348 3a20102bd3df1b16a1c383925ff280ea
      Size/MD5 checksum:    21404 c57eb0e4b427557ea08331a1fad33779
      Size/MD5 checksum:     4816 7df152e52a3794b317ecdb434bfd8295
      Size/MD5 checksum:    25996 4b6716a1024718ab305040fe445794c6
      Size/MD5 checksum:    56908 21b6f8a8f328b37485b4403d0c1b63d3
      Size/MD5 checksum:    26984 7fb1700bf00e7c136bc541670a6e21a8
      Size/MD5 checksum:    13490 d0ff206692c05683bfc25b8628359430
      Size/MD5 checksum:   501868 c1b11ebc04ab12231740ba85ff34fab0

  Little endian MIPS architecture:
      Size/MD5 checksum:   725606 67c6d21460d34f18dabe4b4541da49f0
      Size/MD5 checksum:    21398 373e5e32b5afc536b654006206925d59
      Size/MD5 checksum:     4814 537b6a8c5f982f61a299c429a8e66487
      Size/MD5 checksum:    25926 5c5e4027ef6ca161d15c0088f8ae73e0
      Size/MD5 checksum:    56948 2077d42240aa305ceadd620744e4a3af
      Size/MD5 checksum:    26842 3008905abfba7904d5df4fd55a416bdc
      Size/MD5 checksum:    13456 1daf24ffefc3abe4bc68fc0b86a8056f
      Size/MD5 checksum:   485800 1e801b8a53fcba4d804a1991ef33f598

  PowerPC architecture:
      Size/MD5 checksum:   776788 c45a2dca8dcb7cbd34f4d9a19dc4891f
      Size/MD5 checksum:    21396 0c42f08dd63079eb61dae050629678df
      Size/MD5 checksum:     4814 9311209a5ea526e9f24f5c9311865f7b
      Size/MD5 checksum:    25568 eb202cb0741f3d6dac8c56a5364513b3
      Size/MD5 checksum:    55920 deccf7c64b24a5d4cd133a03fd0965d1
      Size/MD5 checksum:    27254 0768e4faa8088feb0b0ae96d077f9a73
      Size/MD5 checksum:    13480 19e5c0ef57434c581e6609feac1d402e
      Size/MD5 checksum:   597628 ef1f2ff7a37f6a260325aa14156a6293

  IBM S/390 architecture:
      Size/MD5 checksum:   786632 823b69607fc4b1a29544308a46b14da5
      Size/MD5 checksum:    21396 71a5686e9469e65219adfb5e71b25430
      Size/MD5 checksum:     4812 7bbff9c4a6052f2233add2f024a32357
      Size/MD5 checksum:    28408 81d705f49ed63cd6c0e06e2d54aba3ab
      Size/MD5 checksum:    56080 e173c5fa1a60090fc88fbd55810f6713
      Size/MD5 checksum:    28160 e02c2b090c006177af9f79554496d96a
      Size/MD5 checksum:    13626 6cb99ec8320414ff2aae1a021be21038
      Size/MD5 checksum:   498292 90c93d77364f16bf6bbc6df35bd3f7af

  Sun Sparc architecture:
      Size/MD5 checksum:   782502 4f23c31dd8961b0c14098cb35a14a14c
      Size/MD5 checksum:    21394 e59e9cf5957993d613e0bfc168e2895b
      Size/MD5 checksum:     4810 96cc1ed9708a39cd1ee98093c4af5aab
      Size/MD5 checksum:    26404 d6ddf3c6847c1968f763a5803cad36de
      Size/MD5 checksum:    55730 697a73daa3bf53170c03b0c2b56ddce4
      Size/MD5 checksum:    29364 7a6926422194514084fd3637686313a1
      Size/MD5 checksum:    13378 69e08fa7cabf50fa2e97f16a8af16192
      Size/MD5 checksum:   584010 04dd30e9894dff1b2bbaf709ae6e13e2

  These files will probably be moved into the stable distribution on
  its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
Package info: `apt-cache show ' and


LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"50","type":"x","order":"1","pct":80.65,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"7","type":"x","order":"2","pct":11.29,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":8.06,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.