lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 14 May 2010 23:43:11 +0400
From: "Vladimir '3APA3A' Dubrovin" <3APA3A@...URITY.NNOV.RU>
To: Secunia Research <remove-vuln@...unia.com>
Cc: bugtraq@...urityfocus.com
Subject: Re: Secunia Research: KDE KGet Insecure File Operation Vulnerability

Dear Secunia Research,


SR> The vulnerability is caused by KGet downloading files without the 
SR> user's acknowledgment, overwriting existing files of the same name 
SR> when displaying a dialog box that allows a user to choose the file to
SR> download out of the options offered by a metalink file.


SR> The Common Vulnerabilities and Exposures (CVE) project has assigned 
SR> CVE-2010-1511 for the vulnerability.

Is    it   same   vulnerability   with   CVE-2010-1000   or   different?
(CVE-2010-1000:  It  was  discovered  that KGet did not properly perform
input  validation when processing metalink files. If a user were tricked
into  opening a crafted metalink file, a remote attacker could overwrite
files  via directory traversal, which could eventually lead to arbitrary
code execution. )

-- 
Skype: Vladimir.Dubrovin
~/ZARAZA http://securityvulns.com/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ