Gentoo Archives: gentoo-announce

From: Daniel Ahlberg <aliz@g.o>
To: gentoo-announce@g.o
Subject: GLSA: kdenetwork
Date: Thu, 14 Nov 2002 09:17:17
Message-Id: 20021114090438.88EDC3391A@mail1.tamperd.net
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - --------------------------------------------------------------------
5 GENTOO LINUX SECURITY ANNOUNCEMENT 200211-004
6 - - --------------------------------------------------------------------
7
8 PACKAGE : kdenetwork
9 SUMMARY : rlogin.protocol and telnet.protocol URL KIO Vulnerability
10 resLISa / LISa Vulnerabilities
11 DATE    : DATUM
12 EXPLOIT : local & remote
13
14 - - --------------------------------------------------------------------
15
16 from KDE advisory 20021111-1 :
17
18 The implementation of the rlogin protocol in all of the affected
19 systems, and the implementation of the telnet protocol in affected
20 KDE 2 systems, allows a carefully crafted URL in an HTML page,
21 HTML email or other KIO-enabled application to execute arbitrary
22 commands on the system using the victim's account on the
23 vulnerable machine.
24
25 The vulnerability potentially enables local or remote attackers
26 to compromise a victim's account and execute arbitrary commands
27 on the local system with the victim's privileges, such as erasing
28 files, accessing data or installing trojans.
29
30 Read the full advisory at
31 http://www.kde.org/info/security/advisory-20021111-1.txt
32
33 from KDE advisory 20021111-2 :
34
35 The resLISa daemon contains a buffer overflow vulnerability which
36 potentially enables any local user to obtain access to a raw socket
37 if 'reslisa' is installed SUID root. This vulnerability was
38 discovered by the iDEFENSE security team and Texonet.
39
40 The lisa daemon contains a buffer overflow vulnerability which
41 potentially enables any local user, as well any any remote attacker
42 on the LAN who is able to gain control of the LISa port (7741 by
43 default), to obtain root privileges.
44
45 In addition, a remote attacker potentially may be able to gain
46 access to a victim's account by using an "lan://" URL in an HTML
47 page or via another KDE application. These vulnerabilities were
48 discovered by Olaf Kirch at SuSE Linux AG.
49
50 Read the full advisory at
51 http://www.kde.org/info/security/advisory-20021111-2.txt
52
53 More information is available at
54 http://www.idefense.com/advisory/11.11.02.txt
55
56 SOLUTION
57
58 It is recommended that all Gentoo Linux users who are running
59 kde-base/kdenetwork-3.0.4 and earlier update their systems as follows:
60
61 emerge rsync
62 emerge kdenetwork
63 emerge clean
64
65 - - --------------------------------------------------------------------
66 aliz@g.o - GnuPG key is available at www.gentoo.org/~aliz
67 hannes@g.o
68 - - --------------------------------------------------------------------
69 -----BEGIN PGP SIGNATURE-----
70 Version: GnuPG v1.0.7 (GNU/Linux)
71
72 iD8DBQE902cmfT7nyhUpoZMRAt8pAJ9dDutM8qF2/jxTMZ7KQutTjhuLMwCgrZoU
73 d5XyUrE6eAWBiIWQ+V/FfdA=
74 =JhtY
75 -----END PGP SIGNATURE-----