[<prev] [next>] [day] [month] [year] [list]
Message-Id: <200703271349.03120.mueller@kde.org>
Date: Tue, 27 Mar 2007 13:49:02 +0200
From: Dirk Mueller <mueller@....org>
To: bugtraq@...urityfocus.com
Subject: [KDE Security Advisory] KDE ioslave PASV port scanning vulnerability
KDE Security Advisory: KDE ioslave PASV port scanning vulnerability
Original Release Date: 2007-03-26
URL: http://www.kde.org/info/security/advisory-20070326-1.txt
0. References
CVE-2007-1564
1. Systems affected:
KDE up to including KDE version 3.5.6.
2. Overview:
The KDE FTP ioslave parses the host address in the PASV response
of a FTP server response. mark from bindshell.net pointed
out that this could be exploited via JavaScript for automated
port scanning. It was not possible to demonstrate the
vulnerability via JavaScript with Konqueror from KDE 3.5.x.
However, other scenarios are possible.
3. Impact:
Untrusted sites or sites that allow Javascript injection
could cause Konqueror or other web browsers based on KHTML
to perform port scanning.
4. Solution:
Source code patches have been made available which fix these
vulnerabilities. Contact your OS vendor / binary package provider
for information about how to obtain updated binary packages.
5. Patch:
Patch for KDE 3.5.x and newer is available from
ftp://ftp.kde.org/pub/kde/security_patches :
62872147c2d369feb3d9077e9b32b03d CVE-2007-1564-kdelibs-3.5.6.diff
Patch for KDE 3.4.x and newer is available from
ftp://ftp.kde.org/pub/kde/security_patches :
13535c902a6b3223005adfc1fccdd32f CVE-2007-1564-kdelibs-3.4.3.diff
Powered by blists - more mailing lists