SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   KDE Konqueror Vendors:   KDE.org
(Red Hat Issues Fix) KDE Konqueror Input Validation Flaw in Error Page Permits Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1025428
SecurityTracker URL:  http://securitytracker.com/id/1025428
CVE Reference:   CVE-2011-1168   (Links to External Site)
Date:  Apr 21 2011
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.4.x, 4.5.x and 4.6.x; (KDE SC 4.4.0 through KDE SC 4.6.1)
Description:   A vulnerability was reported in KDE Konqueror. A remote user can conduct cross-site scripting attacks.

The error page does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will potentially run in the security context of an arbitrary site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

The vendor was notified on March 16, 2011.

The original advisory is available at:

http://www.nth-dimension.org.uk/pub/NDSA20110321.txt.asc

Tim Brown of Nth Dimension reported this vulnerability.

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with an arbitrary site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   Red Hat has issued a fix.

The Red Hat advisory is available at:

https://rhn.redhat.com/errata/RHSA-2011-0464.html

Vendor URL:  www.kde.org/info/security/advisory-20110411-1.txt (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  6

Message History:   This archive entry is a follow-up to the message listed below.
Apr 12 2011 KDE Konqueror Input Validation Flaw in Error Page Permits Cross-Site Scripting Attacks



 Source Message Contents

Subject:  [RHSA-2011:0464-01] Moderate: kdelibs security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: kdelibs security update
Advisory ID:       RHSA-2011:0464-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2011-0464.html
Issue date:        2011-04-21
CVE Names:         CVE-2011-1094 CVE-2011-1168 
=====================================================================

1. Summary:

Updated kdelibs packages that fix two security issues are now available for
Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64

3. Description:

The kdelibs packages provide libraries for the K Desktop Environment (KDE).

A cross-site scripting (XSS) flaw was found in the way KHTML, the HTML
layout engine used by KDE applications such as the Konqueror web browser,
displayed certain error pages. A remote attacker could use this flaw to
perform a cross-site scripting attack against victims by tricking them into
visiting a specially-crafted URL. (CVE-2011-1168)

A flaw was found in the way kdelibs checked the user specified hostname
against the name in the server's SSL certificate. A man-in-the-middle
attacker could use this flaw to trick an application using kdelibs into
mistakenly accepting a certificate as if it was valid for the host, if that
certificate was issued for an IP address to which the user specified
hostname was resolved to. (CVE-2011-1094)

Note: As part of the fix for CVE-2011-1094, this update also introduces
stricter handling for wildcards used in servers' SSL certificates.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The desktop must be restarted (log out,
then log back in) for this update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

632114 - CVE-2011-1094 kdelibs: SSL certificate for IP address accepted as valid for hosts that resolve to the IP
695398 - CVE-2011-1168 kdelibs: partially universal XSS in Konqueror error pages

6. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kdelibs-4.3.4-11.el6_0.2.src.rpm

i386:
kdelibs-4.3.4-11.el6_0.2.i686.rpm
kdelibs-common-4.3.4-11.el6_0.2.i686.rpm
kdelibs-debuginfo-4.3.4-11.el6_0.2.i686.rpm

x86_64:
kdelibs-4.3.4-11.el6_0.2.i686.rpm
kdelibs-4.3.4-11.el6_0.2.x86_64.rpm
kdelibs-common-4.3.4-11.el6_0.2.x86_64.rpm
kdelibs-debuginfo-4.3.4-11.el6_0.2.i686.rpm
kdelibs-debuginfo-4.3.4-11.el6_0.2.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kdelibs-4.3.4-11.el6_0.2.src.rpm

i386:
kdelibs-debuginfo-4.3.4-11.el6_0.2.i686.rpm
kdelibs-devel-4.3.4-11.el6_0.2.i686.rpm

noarch:
kdelibs-apidocs-4.3.4-11.el6_0.2.noarch.rpm

x86_64:
kdelibs-debuginfo-4.3.4-11.el6_0.2.i686.rpm
kdelibs-debuginfo-4.3.4-11.el6_0.2.x86_64.rpm
kdelibs-devel-4.3.4-11.el6_0.2.i686.rpm
kdelibs-devel-4.3.4-11.el6_0.2.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/kdelibs-4.3.4-11.el6_0.2.src.rpm

noarch:
kdelibs-apidocs-4.3.4-11.el6_0.2.noarch.rpm

x86_64:
kdelibs-4.3.4-11.el6_0.2.i686.rpm
kdelibs-4.3.4-11.el6_0.2.x86_64.rpm
kdelibs-common-4.3.4-11.el6_0.2.x86_64.rpm
kdelibs-debuginfo-4.3.4-11.el6_0.2.i686.rpm
kdelibs-debuginfo-4.3.4-11.el6_0.2.x86_64.rpm
kdelibs-devel-4.3.4-11.el6_0.2.i686.rpm
kdelibs-devel-4.3.4-11.el6_0.2.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/kdelibs-4.3.4-11.el6_0.2.src.rpm

i386:
kdelibs-4.3.4-11.el6_0.2.i686.rpm
kdelibs-common-4.3.4-11.el6_0.2.i686.rpm
kdelibs-debuginfo-4.3.4-11.el6_0.2.i686.rpm
kdelibs-devel-4.3.4-11.el6_0.2.i686.rpm

noarch:
kdelibs-apidocs-4.3.4-11.el6_0.2.noarch.rpm

ppc64:
kdelibs-4.3.4-11.el6_0.2.ppc.rpm
kdelibs-4.3.4-11.el6_0.2.ppc64.rpm
kdelibs-common-4.3.4-11.el6_0.2.ppc64.rpm
kdelibs-debuginfo-4.3.4-11.el6_0.2.ppc.rpm
kdelibs-debuginfo-4.3.4-11.el6_0.2.ppc64.rpm
kdelibs-devel-4.3.4-11.el6_0.2.ppc.rpm
kdelibs-devel-4.3.4-11.el6_0.2.ppc64.rpm

s390x:
kdelibs-4.3.4-11.el6_0.2.s390.rpm
kdelibs-4.3.4-11.el6_0.2.s390x.rpm
kdelibs-common-4.3.4-11.el6_0.2.s390x.rpm
kdelibs-debuginfo-4.3.4-11.el6_0.2.s390.rpm
kdelibs-debuginfo-4.3.4-11.el6_0.2.s390x.rpm
kdelibs-devel-4.3.4-11.el6_0.2.s390.rpm
kdelibs-devel-4.3.4-11.el6_0.2.s390x.rpm

x86_64:
kdelibs-4.3.4-11.el6_0.2.i686.rpm
kdelibs-4.3.4-11.el6_0.2.x86_64.rpm
kdelibs-common-4.3.4-11.el6_0.2.x86_64.rpm
kdelibs-debuginfo-4.3.4-11.el6_0.2.i686.rpm
kdelibs-debuginfo-4.3.4-11.el6_0.2.x86_64.rpm
kdelibs-devel-4.3.4-11.el6_0.2.i686.rpm
kdelibs-devel-4.3.4-11.el6_0.2.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/kdelibs-4.3.4-11.el6_0.2.src.rpm

i386:
kdelibs-4.3.4-11.el6_0.2.i686.rpm
kdelibs-common-4.3.4-11.el6_0.2.i686.rpm
kdelibs-debuginfo-4.3.4-11.el6_0.2.i686.rpm
kdelibs-devel-4.3.4-11.el6_0.2.i686.rpm

noarch:
kdelibs-apidocs-4.3.4-11.el6_0.2.noarch.rpm

x86_64:
kdelibs-4.3.4-11.el6_0.2.i686.rpm
kdelibs-4.3.4-11.el6_0.2.x86_64.rpm
kdelibs-common-4.3.4-11.el6_0.2.x86_64.rpm
kdelibs-debuginfo-4.3.4-11.el6_0.2.i686.rpm
kdelibs-debuginfo-4.3.4-11.el6_0.2.x86_64.rpm
kdelibs-devel-4.3.4-11.el6_0.2.i686.rpm
kdelibs-devel-4.3.4-11.el6_0.2.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2011-1094.html
https://www.redhat.com/security/data/cve/CVE-2011-1168.html
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2011 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFNsGMJXlSAg2UNWIIRAqRnAKCK+XCUdZEiMLrtrj8iKjv2jeLxAgCgh0Ud
EJVwX7KtmkvXF3kXHSHeeho=
=IesW
-----END PGP SIGNATURE-----


--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC