Description
|
|
Two vulnerabilities have been identified in KDE, which could be exploited by attackers to bypass security restrictions and compromise a vulnerable system.
The first issue is caused by an input validation error in KGet when processing the "name" attribute of the "file" element of metalink files, which could be exploited to trick users into downloading files to directories outside of the intended download directory via directory traversal attacks.
The second issue is caused due to KGet automatically starting the download of files without prior user's acknowledgment while displaying a dialog box, which could be exploited to overwrite arbitrary files.
|
|
|
|
Vulnerable Products
|
|
Vulnerable Software: KDE SC versions 4.0.0 through 4.4.3
|
|
|
|
Solution
|
|
Apply patches :
http://www.kde.org/info/security/advisory-20100513-1.txt
|
|
|
|
CVE
|
|
CVE-2010-1511
CVE-2010-1000
|
|
|
|
References
|
|
http://www.kde.org/info/security/advisory-20100513-1.txt
|
|
|
|
Vulnerability Manager Detection
|
|
No
|
|
|
|
IPS Protection
|
|
|
|
|
|