Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2003:079: kdelibs


Vulnerability Assessment Details

MDKSA-2003:079: kdelibs

Vulnerability Assessment Summary
Check for the version of the kdelibs package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2003:079 (kdelibs).


A vulnerability in Konqueror was discovered where it could inadvertently send
authentication credentials to websites other than the intended site in clear
text via the HTTP-referer header when authentication credentials are passed as
part of a URL in the form http://user:password@host/.
The provided packages have a patch that corrects this issue.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2003:079
Network Security Threat Level: High

Networks Security ID: 8297

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

3COM NBX 3103 3C10403A Business Display Manager Telephone VoiP IP 655-0158-01
$49.95
3COM NBX 3103 3C10403A Business Display Manager Telephone VoiP IP 655-0158-01 picture**MINT** Obihai OBi110 Voice service bridge & VoIP telephone adapter FREE CALLS
$32.95
**MINT** Obihai OBi110 Voice service bridge & VoIP telephone adapter FREE CALLS pictureCisco Unified IP VoIP Phone 7941G - (Call Manager Required)
$181.07
Cisco Unified IP VoIP Phone 7941G - (Call Manager Required) pictureAudiocodes IPM260A-120TIP-COMRT VoIP Media Processing.#134005.
$33.33
Audiocodes IPM260A-120TIP-COMRT VoIP Media Processing.#134005. picture


Discussions

No Discussions have been posted on this vulnerability.