KDE Desktop Vulnerability Found

    Date14 Jan 2004
    3433
    Posted ByAnthony Pell
    A carefully crafted .VCF file potentially enables local attackers to compromise the privacy of a victim's data or execute arbitrary commands with the victim's privileges. By default, file information reading is disabled for remote files. However, if previews are enabled for remote files, remote attackers may be able to compromise the victim's account. . . . -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    KDE Security Advisory: VCF file information reader vulnerability
    Original Release Date: 2004-01-14
    URL: http://www.kde.org/info/security/advisory-20040114-1.txt

    0. References


    1. Systems affected:

    All versions of kdepim as distributed with KDE versions 3.1.0
    through 3.1.4 inclusive.


    2. Overview:

    The KDE team has found a buffer overflow in the file
    information reader of VCF files.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CAN-2003-0988 to this issue.


    3. Impact:

    A carefully crafted .VCF file potentially enables local attackers
    to compromise the privacy of a victim's data or execute
    arbitrary commands with the victim's privileges.

    By default, file information reading is disabled for remote files.
    However, if previews are enabled for remote files, remote
    attackers may be able to compromise the victim's account.


    4. Solution:

    As a workaround, remove the kfile_vcf.desktop file.

    Users of KDE 3.1.x are advised to upgrade to KDE 3.1.5. A patch for
    KDE 3.1.4 is available for users who are unable to upgrade to
    KDE 3.1.5.


    5. Patch:

    A patch for KDE 3.1.4 is available from
    ftp://ftp.kde.org/pub/kde/security_patches :

    26469366cc393e50ff80d6dca8c74c58 post-3.1.4-kdepim-kfile-plugins.diff


    6. Time line and credits:

    15/12/2003 KDE developer Dirk Mueller discovers vulnerability.
    15/12/2003 Patches for the vulnerability are applied to CVS and
    release preparations for KDE 3.1.5 are started.

    14/01/2004 Public advisory.


    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.3 (GNU/Linux)

    iD8DBQFABUiwvsXr+iuy1UoRAmf2AKC4JiwDwfDXGME6SZkTF8sVqginEgCgisjC
    MLH9/a8f1cFs0iJ2ebdiShM=
    =Uoit
    -----END PGP SIGNATURE-----

    You are not authorised to post comments.

    LinuxSecurity Poll

    Do you reuse passwords across multiple accounts?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    13
    radio
    [{"id":"55","title":"Yes","votes":"5","type":"x","order":"1","pct":45.45,"resources":[]},{"id":"56","title":"No","votes":"6","type":"x","order":"2","pct":54.55,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.