1 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
2 |
Gentoo Linux Security Advisory GLSA 200404-02 |
3 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
4 |
http://security.gentoo.org |
5 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
6 |
|
7 |
Severity: High |
8 |
Title: KDE Personal Information Management Suite Remote Buffer |
9 |
Overflow Vulnerability |
10 |
Date: April 06, 2004 |
11 |
Bugs: #38256 |
12 |
ID: 200404-02 |
13 |
|
14 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
15 |
|
16 |
Synopsis |
17 |
======== |
18 |
|
19 |
KDE-PIM may be vulnerable to a remote buffer overflow attack that may |
20 |
allow unauthorized access to an affected system. |
21 |
|
22 |
Background |
23 |
========== |
24 |
|
25 |
KDE-PIM is an application suite designed to manage mail, addresses, |
26 |
appointments, and contacts. |
27 |
|
28 |
Affected packages |
29 |
================= |
30 |
|
31 |
------------------------------------------------------------------- |
32 |
Package / Vulnerable / Unaffected |
33 |
------------------------------------------------------------------- |
34 |
kde-base/kde <= 3.1.4 >= 3.1.5 |
35 |
|
36 |
Description |
37 |
=========== |
38 |
|
39 |
A buffer overflow may occur in KDE-PIM's VCF file reader when a |
40 |
maliciously crafted VCF file is opened by a user on a vulnerable |
41 |
system. |
42 |
|
43 |
Impact |
44 |
====== |
45 |
|
46 |
A remote attacker may unauthorized access to a user's personal data or |
47 |
execute commands with the user's privileges. |
48 |
|
49 |
Workaround |
50 |
========== |
51 |
|
52 |
A workaround is not currently known for this issue. All users are |
53 |
advised to upgrade to the latest version of the affected package. |
54 |
|
55 |
Resolution |
56 |
========== |
57 |
|
58 |
KDE users should upgrade to version 3.1.5 or later: |
59 |
|
60 |
# emerge sync |
61 |
|
62 |
# emerge -pv ">=kde-base/kde-3.1.5" |
63 |
# emerge ">=kde-base/kde-3.1.5" |
64 |
|
65 |
References |
66 |
========== |
67 |
|
68 |
[ 1 ] http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0988 |
69 |
|
70 |
Concerns? |
71 |
========= |
72 |
|
73 |
Security is a primary focus of Gentoo Linux and ensuring the |
74 |
confidentiality and security of our users machines is of utmost |
75 |
importance to us. Any security concerns should be addressed to |
76 |
security@g.o or alternatively, you may file a bug at |
77 |
http://bugs.gentoo.org. |