Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2005:022: kdelibs3


Vulnerability Assessment Details

SUSE-SA:2005:022: kdelibs3

Vulnerability Assessment Summary
Check for the version of the kdelibs3 package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2005:022 (kdelibs3).


Several vulnerabilities have been identified and fixed in the KDE
desktop environment.

- A buffer overflow via specially crafted PCX pictures was fixed.

This could lead to a remote attacker being able to execute code
as the user opening or viewing a PCX images. This PCX image could
have been embedded within a web page or Email.

This affects SUSE Linux 9.1 up to 9.3, SUSE Linux Enterprise Server
9 and Novell Linux Desktop 9.


- The IDN domain name cloaking problem was fixed.

A remote website could disguise its name as another potentially
trusted site by using a extension originally meant for non-ASCII
domain names by using 'homographs' which look exactly like other
letters.

The fix used by KDE is only use homographs for trusted domains.
It is disabled by default for the .net, .com and .org domains.

This issue exists in SUSE Linux 9.1 and 9.2, SUSE Linux Enterprise
Server 9 and Novell Linux Desktop 9. It has been assigned the
Mitre CVE ID CVE-2005-0233.


- A denial of service attack against the DCOP service was fixed.

A local user could cause another users KDE session to visible hang
by writing bad data to the world writable DCOP socket. The socket
has been made writable only for the user itself.

This was found by Sebastian Krahmer of SUSE Security.

This affects all SUSE Linux versions, except SUSE Linux 9.3.
Updates for SUSE Linux up to 9.0 and SUSE Linux Enterprise Server
8 are not included for this minor issue. They will be included
should a later security update for different issues be necessary.

This is tracked by the Mitre CVE ID CVE-2005-0396.

Additionally following bug was fixed:

- A possible race in the DNS resolver causing unresolved hosts in rare
cases was fixed. This only affected SUSE Linux 9.3.


Solution : http://www.suse.de/security/advisories/2005_22_kdelibs3.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

HP ProBook 4540s 4740s Intel Laptop Motherboard 7650M/2G s989 683494-001
$192.0
HP ProBook 4540s 4740s Intel Laptop Motherboard 7650M/2G s989 683494-001 pictureGenuine Microsoft Surface 2 1572 Tablet Motherboard Main Logic Board
$49.0
Genuine Microsoft Surface 2 1572 Tablet Motherboard Main Logic Board pictureGigabyte GA-Z68M-D2H Motherboard Intel Z68 Socket LGA 1155 DDR3
$89.95
Gigabyte GA-Z68M-D2H Motherboard Intel Z68 Socket LGA 1155 DDR3 pictureOEM Sony VAIO VPCJ1 Series Intel Motherboard 185768531 MBX-228 1P-0104J00-6011
$42.95
OEM Sony VAIO VPCJ1 Series Intel Motherboard 185768531 MBX-228 1P-0104J00-6011 picture


Discussions

No Discussions have been posted on this vulnerability.