Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2004:150: kdelibs

Vulnerability Assessment Details

MDKSA-2004:150: kdelibs

Vulnerability Assessment Summary
Check for the version of the kdelibs package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2004:150 (kdelibs).

Daniel Fabian discovered a potential privacy issue in KDE. When creating a link
to a remote file from various applications, including Konqueror, the resulting
URL may contain the authentication credentials used to access that remote
resource. This includes, but is not limited to, browsing SMB (Samba) shares.
Upon further investigation, it was found that the SMB protocol handler also
unnecessarily exposed authentication credentials (CVE-2004-1171).

Another vulnerability was discovered where a malicious website could abuse
Konqueror to load its own content into a window or tab that was opened by a
trusted website, or it could trick a trusted website into loading content into
an existing window or tab. This could lead to the user being confused as to the
origin of a particular webpage and could have the user unknowingly send
confidential information intended for a trusted site to the malicious site

The updated packages contain a patch from the KDE team to solve this issue.

Additionally, the kdelibs and kdebase packages for Mandrakelinux 10.1 contain
numerous bugfixes. New qt3 packages are being provided for Mandrakelinux 10.0
that are required to build the kdebase package.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Cisco C9300-24P-E Catalyst 9300 Network Essentials Switch 24 Ports
Cisco C9300-24P-E Catalyst 9300 Network Essentials Switch 24 Ports pictureNEW 16510 Extreme Networks Summit X440-48P-10G 48x 10/100/1000BASE-T PoE-plus
NEW 16510 Extreme Networks Summit X440-48P-10G 48x 10/100/1000BASE-T PoE-plus picture


No Discussions have been posted on this vulnerability.