The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


KDE Security Advisory: Multiple vulnerabilities in Konversation


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: Waldo Bastian <bastian@kde.org.>
To: [email protected]
Subject: KDE Security Advisory:  Multiple vulnerabilities in Konversation
User-Agent: KMail/1.7.91
X-Face: "W;rAB>&6N~&NB#!^;{hcA,`fRf=`}uFMt{y\A~n4v'|V'b[T?Mdi=QQ!7O{-J0Nq@=?iso-8859-1?q?qscz=0A=09mnZ5XabWIl!?=)YKx<!?>(2/_;Azjbs4Q~[<XixQDG'966;]]l[D*\K,d1E^I%9u]j!`@=?iso-8859-1?q?XON=0A=09H1P=245YIt=7EPviZ?=@kz@&%
MIME-Version: 1.0
Date: Fri, 21 Jan 2005 16:31:20 +0100
Content-Type: multipart/signed;
  boundary="nextPart4795341.0jiZI0B2Gx";
  protocol="application/pgp-signature";
  micalg=pgp-sha1
Content-Transfer-Encoding: 7bit
Message-Id: <200501211631.25025.bastian@kde.org.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

--nextPart4795341.0jiZI0B2Gx
Content-Type: text/plain;
  charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

KDE Security Advisory:  Multiple vulnerabilities in Konversation
Original Release Date: 20050121
URL: http://www.kde.org/info/security/advisory-20050121-1.txt

0. References
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2005-0129
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2005-0130
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2005-0131
  http://lists.netsys.com/pipermail/full-disclosure/2005-January/031033.html


1. Systems affected:


        All Konversation versions up to and including 0.15


2. Overview:


        Multiple vulnerabilities have been discovered in Konversation,
        an IRC client  for KDE.

        A flaw in the expansion of %-escaped variables makes that %-escaped
        variables in certain input strings will be inadvertently expanded
        too. The Common Vulnerabilities and Exposures project (cve.mitre.or=
g)
        has assigned the name CAN-2005-0129 to this issue.

        Several perl scripts included with Konversation fail to properly
        handle command line arguments causing a command line injection
        vulnerability. The Common Vulnerabilities and Exposures project
        (cve.mitre.org) has assigned the name CAN-2005-0130 to this issue.
     =20
        Nick and password are confused in the quick connection dialog,=20
        so connecting with that dialog and filling in a password, would
        use that password as nick, and may inadvertently expose the
        password to others. The Common Vulnerabilities and Exposures project
        (cve.mitre.org) has assigned the name CAN-2005-0131 to this issue.
     =20
3. Impact:

        A user might be tricked to join a channel with a specially crafted
        channel name containing shell commands. If user runs a script in
        that channel it will result in an arbitrary command execution.

        If quick connect is used with a password, the password is used as
        nickname instead. As a result the password may be exposed to others.


4. Solution:


        Upgrade to Konversation 0.15.1 available from
        http://download.berlios.de/konversation/konversation-0.15.1.tar.bz2


5. Patch:


        A patch for Konversation 0.15 is available from
        ftp://ftp.kde.org/pub/kde/security_patches

        36f8b6beac18a9d173339388d13e2335  post-0.15-konversation.diff


6. Time line and credits:


        18/01/2005 Konversation developers informed by Wouter Coekaerts
        19/01/2005 Patches applied to KDE CVS.
        19/01/2005 Konversation 0.15.1 released.
        21/01/2005 KDE Security Advisory released.


--nextPart4795341.0jiZI0B2Gx
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQBB8SBMN4pvrENfboIRAg7PAJ4u/TQhS8MGtnDFak2BbL82qKesigCggmtO
U61Vuf+NdDUtTPb60gGxxzU=
=Z68x
-----END PGP SIGNATURE-----

--nextPart4795341.0jiZI0B2Gx--



<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру