blob: 21a36208bc66d2da30e869afa4304e5d8d47bb79 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200902-05">
<title>KTorrent: Multiple vulnerabilitites</title>
Two vulnerabilities in the web interface plugin in KTorrent allow for
remote execution of code and arbitrary torrent uploads.
<product type="ebuild">ktorrent</product>
<announced>February 23, 2009</announced>
<revised>February 23, 2009: 01</revised>
<package name="net-p2p/ktorrent" auto="yes" arch="*">
<unaffected range="ge">2.2.8</unaffected>
<vulnerable range="lt">2.2.8</vulnerable>
KTorrent is a BitTorrent program for KDE.
The web interface plugin does not restrict access to the torrent upload
functionality (CVE-2008-5905) and does not sanitize request parameters
properly (CVE-2008-5906) .
<impact type="high">
A remote attacker could send specially crafted parameters to the web
interface that would allow for arbitrary torrent uploads and remote
code execution with the privileges of the KTorrent process.
Disabling the web interface plugin will prevent exploitation of both
issues. Click "Plugins" in the configuration menu and uncheck the
checkbox left of "WebInterface", then apply the changes.
All KTorrent users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-p2p/ktorrent-2.2.8&quot;</code>
<uri link="">CVE-2008-5905</uri>
<uri link="">CVE-2008-5906</uri>
<metadata tag="requester" timestamp="Tue, 06 Jan 2009 20:05:03 +0000">
<metadata tag="submitter" timestamp="Sat, 10 Jan 2009 00:24:20 +0000">
<metadata tag="bugReady" timestamp="Sat, 10 Jan 2009 19:16:54 +0000">