diff options
author | miwi <miwi@FreeBSD.org> | 2009-11-03 04:12:26 +0800 |
---|---|---|
committer | miwi <miwi@FreeBSD.org> | 2009-11-03 04:12:26 +0800 |
commit | 635e71fe13fc156187d2f9fc93ccff358638fd6b (patch) | |
tree | 7c42248c74a1c5accdaaea0a6c1d166579c17ecd | |
parent | 1926142e509120e700a483b4971c8fe2c72c398c (diff) | |
download | freebsd-ports-gnome-635e71fe13fc156187d2f9fc93ccff358638fd6b.tar.gz freebsd-ports-gnome-635e71fe13fc156187d2f9fc93ccff358638fd6b.tar.zst freebsd-ports-gnome-635e71fe13fc156187d2f9fc93ccff358638fd6b.zip |
- Document KDE -- multiple vulnerabilities
Reported by: Eygene Ryabinkin <rea-fbsd@codelabs.ru>
-rw-r--r-- | security/vuxml/vuln.xml | 47 |
1 files changed, 47 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 7491d1d1813c..bf82dc4a72a4 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -35,6 +35,53 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="6f358f5a-c7ea-11de-a9f3-0030843d3802"> + <topic>KDE -- multiple vulnerabilities</topic> + <affects> + <package> + <name>kdebase4-runtime</name> + <range><lt>4.3.1_2</lt></range> + </package> + <package> + <name>kdelibs4</name> + <range><lt>4.3.1_5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>oCERT reports:</p> + <blockquote cite="http://www.ocert.org/advisories/ocert-2009-015.html"> + <p>Ark input sanitization errors: The KDE archiving tool, Ark, + performs insufficient validation which leads to specially crafted + archive files, using unknown MIME types, to be rendered using a KHTML + instance, this can trigger uncontrolled XMLHTTPRequests to remote + sites.</p> + <p>IO Slaves input sanitization errors: KDE protocol handlers perform + insufficient input validation, an attacker can craft malicious URI + that would trigger JavaScript execution. Additionally the 'help://' + protocol handler suffer from directory traversal. It should be noted + that the scope of this issue is limited as the malicious URIs cannot + be embedded in Internet hosted content.</p> + <p>KMail input sanitization errors: The KDE mail client, KMail, performs + insufficient validation which leads to specially crafted email + attachments, using unknown MIME types, to be rendered using a KHTML + instance, this can trigger uncontrolled XMLHTTPRequests to remote + sites.</p> + <p>The exploitation of these vulnerabilities is unlikely according to + Portcullis and KDE but the execution of active content is nonetheless + unexpected and might pose a threat.</p> + </blockquote> + </body> + </description> + <references> + <url>http://www.ocert.org/advisories/ocert-2009-015.html</url> + </references> + <dates> + <discovery>2009-10-30</discovery> + <entry>2009-11-02</entry> + </dates> + </vuln> + <vuln vid="2fda6bd2-c53c-11de-b157-001999392805"> <topic>opera -- multiple vulnerabilities</topic> <affects> |