1 |
-----BEGIN PGP SIGNED MESSAGE----- |
2 |
Hash: SHA1 |
3 |
|
4 |
- - -------------------------------------------------------------------- |
5 |
GENTOO LINUX SECURITY ANNOUNCEMENT 200211-004 |
6 |
- - -------------------------------------------------------------------- |
7 |
|
8 |
PACKAGE : kdelibs |
9 |
SUMMARY : rlogin.protocol and telnet.protocol URL KIO Vulnerability |
10 |
resLISa / LISa Vulnerabilities |
11 |
DATE : DATUM |
12 |
EXPLOIT : local & remote |
13 |
|
14 |
- - -------------------------------------------------------------------- |
15 |
|
16 |
from KDE advisory 20021111-1 : |
17 |
|
18 |
The implementation of the rlogin protocol in all of the affected |
19 |
systems, and the implementation of the telnet protocol in affected |
20 |
KDE 2 systems, allows a carefully crafted URL in an HTML page, |
21 |
HTML email or other KIO-enabled application to execute arbitrary |
22 |
commands on the system using the victim's account on the |
23 |
vulnerable machine. |
24 |
|
25 |
The vulnerability potentially enables local or remote attackers |
26 |
to compromise a victim's account and execute arbitrary commands |
27 |
on the local system with the victim's privileges, such as erasing |
28 |
files, accessing data or installing trojans. |
29 |
|
30 |
Read the full advisory at |
31 |
http://www.kde.org/info/security/advisory-20021111-1.txt |
32 |
|
33 |
from KDE advisory 20021111-2 : |
34 |
|
35 |
The resLISa daemon contains a buffer overflow vulnerability which |
36 |
potentially enables any local user to obtain access to a raw socket |
37 |
if 'reslisa' is installed SUID root. This vulnerability was |
38 |
discovered by the iDEFENSE security team and Texonet. |
39 |
|
40 |
The lisa daemon contains a buffer overflow vulnerability which |
41 |
potentially enables any local user, as well any any remote attacker |
42 |
on the LAN who is able to gain control of the LISa port (7741 by |
43 |
default), to obtain root privileges. |
44 |
|
45 |
In addition, a remote attacker potentially may be able to gain |
46 |
access to a victim's account by using an "lan://" URL in an HTML |
47 |
page or via another KDE application. These vulnerabilities were |
48 |
discovered by Olaf Kirch at SuSE Linux AG. |
49 |
|
50 |
Read the full advisory at |
51 |
http://www.kde.org/info/security/advisory-20021111-2.txt |
52 |
|
53 |
More information is available at |
54 |
http://www.idefense.com/advisory/11.11.02.txt |
55 |
|
56 |
SOLUTION |
57 |
|
58 |
It is recommended that all Gentoo Linux users who are running |
59 |
kde-base/kdelibs-3.0.4 and earlier update their systems as follows: |
60 |
|
61 |
emerge rsync |
62 |
emerge kdelibs |
63 |
emerge clean |
64 |
|
65 |
- - -------------------------------------------------------------------- |
66 |
aliz@g.o - GnuPG key is available at www.gentoo.org/~aliz |
67 |
hannes@g.o |
68 |
- - -------------------------------------------------------------------- |
69 |
-----BEGIN PGP SIGNATURE----- |
70 |
Version: GnuPG v1.0.7 (GNU/Linux) |
71 |
|
72 |
iD8DBQE902/SfT7nyhUpoZMRAg8wAKCcPSEbh+xXPVn9CdVTTJLoaXWymwCfQGWq |
73 |
OP1MzPDSrSIHbJO6rn9Naig= |
74 |
=YJX0 |
75 |
-----END PGP SIGNATURE----- |