Lucene search

K
certCERTVU:420222
HistoryJan 05, 2005 - 12:00 a.m.

Konqueror fails to restrict access to Java classes

2005-01-0500:00:00
www.kb.cert.org
18

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.006 Low

EPSS

Percentile

77.9%

Overview

The Konqueror web browser may allow Java applets and JavaScripts to bypass the Java security settings and access restricted Java classes. Exploitation may allow a remote attacker to read and write arbitrary files on a vulnerable system.

Description

Konqueror is a web browser and file manager for the K Desktop Environment (KDE). A flaw in Konqueror may allow Java applets and JavaScripts to bypass the Java security settings and access restricted Java classes. Once the security restrictions are bypassed, the malicious applet or script may be able to access and manipulate system resources.

For more information on the Java security model see Sun’s Java documentation, particularly the Applet Security FAQ referenced above. Microsoft provides similar documentation in its Java Security Overview and a corresponding FAQ.

Note that Java must be enabled in Konqueror to exploit this vulnerability with a Java applet. For exploitation via JavaScript, active scripting must be enabled.


Impact

By enticing a user to view and execute a malicious Java applet or JavaScript , a remote attacker may be able to read and write arbitrary files with the privileges of the browser process.


Solution

Upgrade

Update to Konqueror version 3.3.2._
_
Apply Patch

A patch for Konqueror 3.2.3 is available to correct this issue._
_


Disable Active Scripting and Java

At a minimum, disable Active scripting and Java within the web browser. Instructions for disabling Active scripting and Java can be found in the CERT/CC Malicious Web Scripts FAQ.


Vendor Information

420222

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

KDE Desktop Environment Project __ Unknown

Updated: December 21, 2004

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

US-CERT has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23420222 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was publicly reported by Waldo Bastian.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2004-1145
Severity Metric: 3.90 Date Public:

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.006 Low

EPSS

Percentile

77.9%