blob: 4ec44092f107356d6f7f601d96ebc9c015a15203 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200601-11">
<title>KDE kjs: URI heap overflow vulnerability</title>
KDE fails to properly validate URIs when handling javascript, potentially
resulting in the execution of arbitrary code.
<product type="ebuild">KDE</product>
<announced>January 22, 2006</announced>
<revised>January 22, 2006: 01</revised>
<package name="kde-base/kdelibs" auto="yes" arch="*">
<unaffected range="ge">3.4.3-r1</unaffected>
<vulnerable range="lt">3.4.3-r1</vulnerable>
KDE is a feature-rich graphical desktop environment for Linux and
Unix-like Operating Systems. kjs is the javascript interpreter used in
Konqueror and other parts of KDE.
Maksim Orlovich discovered an incorrect bounds check in kjs when
handling URIs.
<impact type="normal">
By enticing a user to load a specially crafted webpage containing
malicious javascript, an attacker could execute arbitrary code with the
rights of the user running kjs.
There is no known workaround at this time.
All kdelibs users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose kde-base/kdelibs-3.4.3-r1</code>
<uri link="">CVE-2006-0019</uri>
<uri link="">KDE Security Advisory: kjs encodeuri/decodeuri heap overflow vulnerability</uri>
<metadata tag="submitter" timestamp="Fri, 20 Jan 2006 06:30:56 +0000">
<metadata tag="bugReady" timestamp="Sat, 21 Jan 2006 13:57:57 +0000">