SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   KDE Konqueror Vendors:   KDE.org
(Mandrake Issues Fix) KDE Konqueror Input Validation Error in Processing FTP URLs May Let Remote Users Inject Arbitrary FTP Commands
SecurityTracker Alert ID:  1013233
SecurityTracker URL:  http://securitytracker.com/id/1013233
CVE Reference:   CVE-2004-1165   (Links to External Site)
Date:  Feb 18 2005
Impact:   Execution of arbitrary code via network, Host/resource access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 3.3.1 and prior versions
Description:   A vulnerability was reported in KDE Konqueror in the processing of FTP URLs. A remote user may be able to cause FTP commands to be executed.

Albert Puigsech Galicia reported that a remote user can create a specially crafted FTP URL that, when loaded by the target user, will execute arbitrary FTP commands on the specified FTP server. The commands can be appended to the URL, separated by the string '%0a'. A demonstration exploit URL is of the following format:

ftp://ftpuser:ftppass@server/directory%0asomecommand%0a

The target user must first be authenticated against the FTP server for the exploit to work.

The vendor was notified on December 2, 2004.

Impact:   A remote user can create a URL that, when loaded by the target user, may execute arbitrary FTP commands on the specified FTP server.
Solution:   Mandrake has released a fix.

Mandrakelinux 10.0:
36c26678038288bba80c3d72c9a1e20a 10.0/RPMS/kdelibs-common-3.2-36.10.100mdk.i586.rpm
3db366da3e09c4237e2a88732faca7a7 10.0/RPMS/libkdecore4-3.2-36.10.100mdk.i586.rpm
38c354234f316a456b9ff82c9535546e 10.0/RPMS/libkdecore4-devel-3.2-36.10.100mdk.i586.rpm
6912a08ee5359a4fdb48cac88b1a038b 10.0/SRPMS/kdelibs-3.2-36.10.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
dd9a0f3b2adcb7b59831e8f0edd73cce amd64/10.0/RPMS/kdelibs-common-3.2-36.10.100mdk.amd64.rpm
7a20989e14ff56ac7dbabca376bfba12 amd64/10.0/RPMS/lib64kdecore4-3.2-36.10.100mdk.amd64.rpm
071d26aa2f356d2dcc2bff274425531b amd64/10.0/RPMS/lib64kdecore4-devel-3.2-36.10.100mdk.amd64.rpm
6912a08ee5359a4fdb48cac88b1a038b amd64/10.0/SRPMS/kdelibs-3.2-36.10.100mdk.src.rpm

Mandrakelinux 10.1:
0cfe09de4cb942b4368cd1de240b17fa 10.1/RPMS/kdelibs-common-3.2.3-103.1.101mdk.i586.rpm
d8022d4320136b4112c23341c1312af5 10.1/RPMS/libkdecore4-3.2.3-103.1.101mdk.i586.rpm
41a707aab07bf9638c03103d40bca306 10.1/RPMS/libkdecore4-devel-3.2.3-103.1.101mdk.i586.rpm
8a24af1c667e03470cf4528dbd86a164 10.1/SRPMS/kdelibs-3.2.3-103.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
0ddace363e075b7715ddf481e530eaa7 x86_64/10.1/RPMS/kdelibs-common-3.2.3-103.1.101mdk.x86_64.rpm
b22c35e586b9a26c85998b77904a7340 x86_64/10.1/RPMS/lib64kdecore4-3.2.3-103.1.101mdk.x86_64.rpm
3550dbe6d2c956442ecbda70fa71d9dd x86_64/10.1/RPMS/lib64kdecore4-devel-3.2.3-103.1.101mdk.x86_64.rpm
d8022d4320136b4112c23341c1312af5 x86_64/10.1/RPMS/libkdecore4-3.2.3-103.1.101mdk.i586.rpm
8a24af1c667e03470cf4528dbd86a164 x86_64/10.1/SRPMS/kdelibs-3.2.3-103.1.101mdk.src.rpm

Corporate 3.0:
d93acd6d0050a6a5b0abddb91a791db5 corporate/3.0/RPMS/kdelibs-common-3.2-36.10.C30mdk.i586.rpm
6e3073f7f0ac52b6fcf38d43261cb7c3 corporate/3.0/RPMS/libkdecore4-3.2-36.10.C30mdk.i586.rpm
c753a66a47496ee4f765384afafa88d0 corporate/3.0/RPMS/libkdecore4-devel-3.2-36.10.C30mdk.i586.rpm
f057bf8b85687559e57527247cdc1de7 corporate/3.0/SRPMS/kdelibs-3.2-36.10.C30mdk.src.rpm

Corporate 3.0/X86_64:
04adc6e0b68e461c0b8bf5c3d07e4cbc x86_64/corporate/3.0/RPMS/kdelibs-common-3.2-36.10.C30mdk.x86_64.rpm
71202f8a27e9fdb2846cd14c339b87fa x86_64/corporate/3.0/RPMS/lib64kdecore4-3.2-36.10.C30mdk.x86_64.rpm
01d20ae725a9127ca492b9f447f189c0 x86_64/corporate/3.0/RPMS/lib64kdecore4-devel-3.2-36.10.C30mdk.x86_64.rpm
f057bf8b85687559e57527247cdc1de7 x86_64/corporate/3.0/SRPMS/kdelibs-3.2-36.10.C30mdk.src.rpm

Vendor URL:  www.kde.org/ (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Linux (Mandriva/Mandrake)
Underlying OS Comments:  10.0, 10.1, Corporate 3.0

Message History:   This archive entry is a follow-up to the message listed below.
Dec 7 2004 KDE Konqueror Input Validation Error in Processing FTP URLs May Let Remote Users Inject Arbitrary FTP Commands



 Source Message Contents

Subject:  [Security Announce] MDKSA-2005:045 - Updated kdelibs packages fix


This is a multi-part message in MIME format...

------------=_1108700499-31468-3580

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                 Mandrakelinux Security Update Advisory
 _______________________________________________________________________

 Package name:           kdelibs
 Advisory ID:            MDKSA-2005:045
 Date:                   February 17th, 2005

 Affected versions:	 10.0, 10.1, Corporate 3.0
 ______________________________________________________________________

 Problem Description:

 A bug in the way kioslave handles URL-encoded newline (%0a)
 characters before the FTP command was discovered.  Because of this, it
 is possible that a specially crafted URL could be used to execute any
 ftp command on a remote server, or even send unsolicited email.
 
 As well, Davide Madrisan discovered that dcopidlng created temporary
 files in an insecure manner.
 
 The updated packages are patched to deal with these issues.
 _______________________________________________________________________

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1165
  http://www.kde.org/info/security/advisory-20050101-1.txt
  http://bugs.kde.org/show_bug.cgi?id=97608
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.0:
 36c26678038288bba80c3d72c9a1e20a  10.0/RPMS/kdelibs-common-3.2-36.10.100mdk.i586.rpm
 3db366da3e09c4237e2a88732faca7a7  10.0/RPMS/libkdecore4-3.2-36.10.100mdk.i586.rpm
 38c354234f316a456b9ff82c9535546e  10.0/RPMS/libkdecore4-devel-3.2-36.10.100mdk.i586.rpm
 6912a08ee5359a4fdb48cac88b1a038b  10.0/SRPMS/kdelibs-3.2-36.10.100mdk.src.rpm

 Mandrakelinux 10.0/AMD64:
 dd9a0f3b2adcb7b59831e8f0edd73cce  amd64/10.0/RPMS/kdelibs-common-3.2-36.10.100mdk.amd64.rpm
 7a20989e14ff56ac7dbabca376bfba12  amd64/10.0/RPMS/lib64kdecore4-3.2-36.10.100mdk.amd64.rpm
 071d26aa2f356d2dcc2bff274425531b  amd64/10.0/RPMS/lib64kdecore4-devel-3.2-36.10.100mdk.amd64.rpm
 6912a08ee5359a4fdb48cac88b1a038b  amd64/10.0/SRPMS/kdelibs-3.2-36.10.100mdk.src.rpm

 Mandrakelinux 10.1:
 0cfe09de4cb942b4368cd1de240b17fa  10.1/RPMS/kdelibs-common-3.2.3-103.1.101mdk.i586.rpm
 d8022d4320136b4112c23341c1312af5  10.1/RPMS/libkdecore4-3.2.3-103.1.101mdk.i586.rpm
 41a707aab07bf9638c03103d40bca306  10.1/RPMS/libkdecore4-devel-3.2.3-103.1.101mdk.i586.rpm
 8a24af1c667e03470cf4528dbd86a164  10.1/SRPMS/kdelibs-3.2.3-103.1.101mdk.src.rpm

 Mandrakelinux 10.1/X86_64:
 0ddace363e075b7715ddf481e530eaa7  x86_64/10.1/RPMS/kdelibs-common-3.2.3-103.1.101mdk.x86_64.rpm
 b22c35e586b9a26c85998b77904a7340  x86_64/10.1/RPMS/lib64kdecore4-3.2.3-103.1.101mdk.x86_64.rpm
 3550dbe6d2c956442ecbda70fa71d9dd  x86_64/10.1/RPMS/lib64kdecore4-devel-3.2.3-103.1.101mdk.x86_64.rpm
 d8022d4320136b4112c23341c1312af5  x86_64/10.1/RPMS/libkdecore4-3.2.3-103.1.101mdk.i586.rpm
 8a24af1c667e03470cf4528dbd86a164  x86_64/10.1/SRPMS/kdelibs-3.2.3-103.1.101mdk.src.rpm

 Corporate 3.0:
 d93acd6d0050a6a5b0abddb91a791db5  corporate/3.0/RPMS/kdelibs-common-3.2-36.10.C30mdk.i586.rpm
 6e3073f7f0ac52b6fcf38d43261cb7c3  corporate/3.0/RPMS/libkdecore4-3.2-36.10.C30mdk.i586.rpm
 c753a66a47496ee4f765384afafa88d0  corporate/3.0/RPMS/libkdecore4-devel-3.2-36.10.C30mdk.i586.rpm
 f057bf8b85687559e57527247cdc1de7  corporate/3.0/SRPMS/kdelibs-3.2-36.10.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 04adc6e0b68e461c0b8bf5c3d07e4cbc  x86_64/corporate/3.0/RPMS/kdelibs-common-3.2-36.10.C30mdk.x86_64.rpm
 71202f8a27e9fdb2846cd14c339b87fa  x86_64/corporate/3.0/RPMS/lib64kdecore4-3.2-36.10.C30mdk.x86_64.rpm
 01d20ae725a9127ca492b9f447f189c0  x86_64/corporate/3.0/RPMS/lib64kdecore4-devel-3.2-36.10.C30mdk.x86_64.rpm
 f057bf8b85687559e57527247cdc1de7  x86_64/corporate/3.0/SRPMS/kdelibs-3.2-36.10.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandrakesoft for security.  You can obtain
 the GPG public key of the Mandrakelinux Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandrakelinux at:

  http://www.mandrakesoft.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFCFVuMmqjQ0CJFipgRAj2uAKDypzAdIDIK3cDnfGlN1QZJrnyWTgCeLjwZ
WyFMDq1yWBQ1kRWTFdLApo8=
=oTms
-----END PGP SIGNATURE-----


------------=_1108700499-31468-3580
Content-Type: text/plain; name="message.footer"
Content-Disposition: inline; filename="message.footer"
Content-Transfer-Encoding: 8bit

____________________________________________________
Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com
Join the Club : http://www.mandrakeclub.com
____________________________________________________

------------=_1108700499-31468-3580--

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC