lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <200701091632.41919.mueller@kde.org>
Date: Tue, 9 Jan 2007 16:32:41 +0100
From: Dirk Mueller <mueller@....org>
To: bugtraq@...urityfocus.com
Cc: vendor-sec@....de
Subject: [KDE Security Advisory] ksirc Denial of Service vulnerability


KDE Security Advisory: ksirc denial of service vulnerability
Original Release Date: 2007-01-09
URL: http://www.kde.org/info/security/advisory-20070109-1.txt

0. References

	CVE-2006-6811
	http://www.milw0rm.com/exploits/3023
	http://www.securityfocus.com/bid/21790


1. Systems affected:

	ksirc as shipped with KDE 3.5.5 or older. KDE 3.5.6 and
	newer is not affected.


2. Overview:

	On 2006-12-27, a proof of concept for arbitrary code execution
	in ksirc was published by Federico L. Bossi Bonin. The published
	exploit triggers an assertion in ksirc and results in a
	a NULL pointer dereference (crash) for non-debug builds.


3. Impact:

	A malicious IRC server can crash the ksirc client. No arbitrary
	code execution is possible by this vulnerability.


4. Solution:

        Source code patches have been made available which fix these
        vulnerabilities. Contact your OS vendor / binary package provider
        for information about how to obtain updated binary packages.


5. Patch:

        A patch for KDE 3.5.5 is available from
        ftp://ftp.kde.org/pub/kde/security_patches :

	72897a581daa9f71bdf61238f4c3e693  post-3.5.5-kdenetwork-ksirc.diff


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ