From: Dirk Mueller <dirk@kde.org.>
To: [email protected]Subject: [KDE Security Advisory]: Kommander untrusted code execution
Date: Fri, 22 Apr 2005 02:03:21 +0200
User-Agent: KMail/1.8.50
Cc: [email protected]
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline
Message-Id: <200504220203.22178.dirk@kde.org.>
X-Virus-Scanned: antivirus-gw at tyumen.ru
KDE Security Advisory: Kommander untrusted code execution
Original Release Date: 2005-04-20
URL: http://www.kde.org/info/security/advisory-20050420-1.txt
0. References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2005-0754
1. Systems affected:
Quanta 3.1.x, KDE 3.2 and new up to including KDE 3.4.0.
2. Overview:
Kommander is a visual editor and interpreter to edit and
interpret visual dialogs and execute scripts attached to
dialog actions.=20
Kommander executes without user confirmation data files
from possibly untrusted locations. As they contain=20
scripts, the user might accidentally run arbitrary code.
3. Impact:
Remotly supplied kommander files from untrusted sources
are executed without confirmation.=20
4. Solution:
Source code patches have been made available which fix these
vulnerabilities. Contact your OS vendor / binary package provider
for information about how to obtain updated binary packages.
5. Patch:
A patch for KDE 3.4.0 is available from=20
ftp://ftp.kde.org/pub/kde/security_patches :
c388b21d91c8326fc9757cd8786713db post-3.4.0-kdewebdev-kommander.di=
ff
A patch for KDE 3.3.2 is available from=20
ftp://ftp.kde.org/pub/kde/security_patches :
d210c07121c1ba3a97660a6e166738e6 post-3.3.2-kdewebdev-kommander.di=
ff
6. Time line and credits:
13/03/2005 Notification of KDE security by Eckhart W=F6rner
20/04/2005 Public Disclosure