diff options
author | miwi <miwi@FreeBSD.org> | 2009-11-03 17:45:47 +0800 |
---|---|---|
committer | miwi <miwi@FreeBSD.org> | 2009-11-03 17:45:47 +0800 |
commit | f93a6362ea7218c84252e0327f60c9b06285bdaf (patch) | |
tree | d52c0940d05e200a3d889e73c63f6f352a38144d /x11/kdebase4-runtime/files | |
parent | 6cae593ec19375372efc37fd85addcc03c5c4a42 (diff) | |
download | freebsd-ports-gnome-f93a6362ea7218c84252e0327f60c9b06285bdaf.tar.gz freebsd-ports-gnome-f93a6362ea7218c84252e0327f60c9b06285bdaf.tar.zst freebsd-ports-gnome-f93a6362ea7218c84252e0327f60c9b06285bdaf.zip |
Secuirty Update:
Ark input sanitization errors:
The KDE archiving tool, Ark, performs insufficient validation
which leads to specially crafted archive files, using unknown
MIME types, to be rendered using a KHTML instance, this can
trigger uncontrolled XMLHTTPRequests to remote sites.
IO Slaves input sanitization errors:
KDE protocol handlers perform insufficient input validation, an
attacker can craft malicious URI that would trigger JavaScript
execution. Additionally the 'help://' protocol handler suffer
from directory traversal. It should be noted that the scope of
this issue is limited as the malicious URIs cannot be embedded
in Internet hosted content.
KMail input sanitization errors:
The KDE mail client, KMail, performs insufficient validation which
leads to specially crafted email attachments, using unknown MIME
types, to be rendered using a KHTML instance, this can trigger
uncontrolled XMLHTTPRequests to remote sites.
Submitted by: Eygene Ryabinkin <rea-fbsd@codelabs.ru> (based on)
Approved by: secteam (myself), portmgr
Security: http://www.vuxml.org/freebsd/6f358f5a-c7ea-11de-a9f3-0030843d3802.html
Diffstat (limited to 'x11/kdebase4-runtime/files')
-rw-r--r-- | x11/kdebase4-runtime/files/patch-ocert-2009-015-kioslave | 16 |
1 files changed, 16 insertions, 0 deletions
diff --git a/x11/kdebase4-runtime/files/patch-ocert-2009-015-kioslave b/x11/kdebase4-runtime/files/patch-ocert-2009-015-kioslave new file mode 100644 index 000000000000..0024b941e34d --- /dev/null +++ b/x11/kdebase4-runtime/files/patch-ocert-2009-015-kioslave @@ -0,0 +1,16 @@ +--- ./kioslave/info/info.cc 2009/10/02 15:51:26 1030578 ++++ ./kioslave/info/info.cc 2009/10/02 15:53:30 1030579 +@@ -89,6 +89,13 @@ + return; + } + ++ // '<' in the path looks suspicious, someone is trying info:/dir/<script>alert('xss')</script> ++ if (url.path().contains('<')) ++ { ++ error(KIO::ERR_DOES_NOT_EXIST, url.url()); ++ return; ++ } ++ + mimeType("text/html"); + // extract the path and node from url + decodeURL( url ); |