summaryrefslogtreecommitdiff
blob: 9a446af2cb4ed0e0719c600331157785e6893924 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200501-18">
  <title>KDE FTP KIOslave: Command injection</title>
  <synopsis>
    The FTP KIOslave contains a bug allowing users to execute arbitrary FTP
    commands.
  </synopsis>
  <product type="ebuild">konqueror</product>
  <announced>2005-01-11</announced>
  <revised count="02">2005-01-12</revised>
  <bug>73759</bug>
  <access>remote</access>
  <affected>
    <package name="kde-base/kdelibs" auto="yes" arch="*">
      <unaffected range="ge">3.3.2-r2</unaffected>
      <unaffected range="rge">3.2.3-r5</unaffected>
      <vulnerable range="lt">3.3.2-r2</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    KDE is a feature-rich graphical desktop environment for Linux and
    Unix-like Operating Systems. KDE provided KIOslaves for many protocols
    in the kdelibs package, one of them being FTP. These are used by KDE
    applications such as Konqueror.
    </p>
  </background>
  <description>
    <p>
    The FTP KIOslave fails to properly parse URL-encoded newline
    characters.
    </p>
  </description>
  <impact type="normal">
    <p>
    An attacker could exploit this to execute arbitrary FTP commands on the
    server and due to similiarities between the FTP and the SMTP protocol,
    this vulnerability also allows an attacker to connect to a SMTP server
    and issue arbitrary commands, for example sending an email.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All kdelibs users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose kde-base/kdelibs</code>
  </resolution>
  <references>
    <uri link="https://www.kde.org/info/security/advisory-20050101-1.txt">KDE Security Advisory: ftp kioslave command injection</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1165">CAN-2004-1165</uri>
  </references>
  <metadata tag="submitter" timestamp="2005-01-05T16:56:23Z">
    jaervosz
  </metadata>
  <metadata tag="bugReady" timestamp="2005-01-11T12:39:06Z">
    jaervosz
  </metadata>
</glsa>