Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Ubuntu Local Security Checks >> USN115-1 : kdewebdev vulnerability


Vulnerability Assessment Details

USN115-1 : kdewebdev vulnerability

Vulnerability Assessment Summary
kdewebdev vulnerability

Detailed Explanation for this Vulnerability Assessment

Summary :

These remote packages are missing security patches :
- kdewebdev
- kdewebdev-doc-html
- kfilereplace
- kimagemapeditor
- klinkstatus
- kommander
- kommander-dev
- kxsldbg
- quanta
- quanta-data


Description :

Eckhart Wörner discovered that Kommander opens files from remote and
possibly untrusted locations without user confirmation. Since
Kommander files can contain scripts, this would permit a possible hacker to
execute arbitrary code with the rights of the user opening the
file.

The updated Kommander will not automatically open files from remote
locations, and files which do not end with ".kmdr" any more.

Solution :

Upgrade to :
- kdewebdev-3.4.0-0ubuntu2.2 (Ubuntu 5.04)
- kdewebdev-doc-html-3.4.0-0ubuntu2.2 (Ubuntu 5.04)
- kfilereplace-3.4.0-0ubuntu2.2 (Ubuntu 5.04)
- kimagemapeditor-3.4.0-0ubuntu2.2 (Ubuntu 5.04)
- klinkstatus-3.4.0-0ubuntu2.2 (Ubuntu 5.04)
- kommander-3.4.0-0ubuntu2.2 (Ubuntu 5.04)
- kommander-dev-3.4.0-0ubuntu2.2 (Ubuntu 5.04)
- kxsldbg-3.4.0-0ubuntu2.2 (Ubuntu 5.04)
- quanta-3.4.0-0ubuntu2.2 (Ubuntu 5.04)
- quanta-data-3.4.0-0ubuntu2.2 (Ubuntu 5.04)



Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi

Cables, Connectors

Server RAM 32GB 8 X PC3-10600R ECC REG DDR3 1333 2Rx4 IBM 44T1493
$60.0
Server RAM 32GB 8 X PC3-10600R ECC REG DDR3 1333 2Rx4 IBM 44T1493 picture5 IBM IBM9316 Power 6 Ceramic Server 4.7GHz CPU Processor 51Y2837 46J6799
$24.95
5 IBM IBM9316 Power 6 Ceramic Server 4.7GHz CPU Processor 51Y2837 46J6799 pictureIBM System X3550 M4 Server Intel Xeon 1.8GHz M5100 Raid TESTED NO HD/RAM/OS
$24.95
IBM System X3550 M4 Server Intel Xeon 1.8GHz M5100 Raid TESTED NO HD/RAM/OS pictureLot of IBM System x3550 M3 x3690 X5 Fujitsu XG2600
$5500.0
Lot of IBM System x3550 M3 x3690 X5 Fujitsu XG2600 picture


Discussions

No Discussions have been posted on this vulnerability.