<<< Date Index >>>     <<< Thread Index >>>

[KDE Security Advisory] KDE ioslave PASV port scanning vulnerability




KDE Security Advisory: KDE ioslave PASV port scanning vulnerability
Original Release Date: 2007-03-26
URL: http://www.kde.org/info/security/advisory-20070326-1.txt

0. References
        CVE-2007-1564


1. Systems affected:

        KDE up to including KDE version 3.5.6.


2. Overview:

        The KDE FTP ioslave parses the host address in the PASV response
        of a FTP server response. mark from bindshell.net pointed
        out that this could be exploited via JavaScript for automated
        port scanning. It was not possible to demonstrate the
        vulnerability via JavaScript with Konqueror from KDE 3.5.x.
        However, other scenarios are possible.


3. Impact:

        Untrusted sites or sites that allow Javascript injection
        could cause Konqueror or other web browsers based on KHTML
        to perform port scanning.


4. Solution:

        Source code patches have been made available which fix these
        vulnerabilities. Contact your OS vendor / binary package provider
        for information about how to obtain updated binary packages.


5. Patch:

        Patch for KDE 3.5.x and newer is available from
        ftp://ftp.kde.org/pub/kde/security_patches :

        62872147c2d369feb3d9077e9b32b03d  CVE-2007-1564-kdelibs-3.5.6.diff

        Patch for KDE 3.4.x and newer is available from
        ftp://ftp.kde.org/pub/kde/security_patches :

        13535c902a6b3223005adfc1fccdd32f  CVE-2007-1564-kdelibs-3.4.3.diff