<<< Date Index >>>     <<< Thread Index >>>

[KDE Security Advisory]: Kommander untrusted code execution



KDE Security Advisory: Kommander untrusted code execution
Original Release Date: 2005-04-20
URL: http://www.kde.org/info/security/advisory-20050420-1.txt

0. References

        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0754

1. Systems affected:

        Quanta 3.1.x, KDE 3.2 and new up to including KDE 3.4.0.


2. Overview:

        Kommander is a visual editor and interpreter to edit and
        interpret visual dialogs and execute scripts attached to
        dialog actions. 

        Kommander executes without user confirmation data files
        from possibly untrusted locations. As they contain 
        scripts, the user might accidentally run arbitrary code.


3. Impact:

        Remotly supplied kommander files from untrusted sources
        are executed without confirmation. 


4. Solution:

        Source code patches have been made available which fix these
        vulnerabilities. Contact your OS vendor / binary package provider
        for information about how to obtain updated binary packages.


5. Patch:

        A patch for KDE 3.4.0 is available from 
        ftp://ftp.kde.org/pub/kde/security_patches :

        c388b21d91c8326fc9757cd8786713db  post-3.4.0-kdewebdev-kommander.diff

        A patch for KDE 3.3.2 is available from 
        ftp://ftp.kde.org/pub/kde/security_patches :

        d210c07121c1ba3a97660a6e166738e6  post-3.3.2-kdewebdev-kommander.diff


6. Time line and credits:

        13/03/2005 Notification of KDE security by Eckhart Wörner
        20/04/2005 Public Disclosure