Lucene search

K
gentooGentoo FoundationGLSA-200404-02
HistoryApr 06, 2004 - 12:00 a.m.

KDE Personal Information Management Suite Remote Buffer Overflow Vulnerability

2004-04-0600:00:00
Gentoo Foundation
security.gentoo.org
13

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.028 Low

EPSS

Percentile

90.5%

Background

KDE-PIM is an application suite designed to manage mail, addresses, appointments, and contacts.

Description

A buffer overflow may occur in KDE-PIM’s VCF file reader when a maliciously crafted VCF file is opened by a user on a vulnerable system.

Impact

A remote attacker may unauthorized access to a user’s personal data or execute commands with the user’s privileges.

Workaround

A workaround is not currently known for this issue. All users are advised to upgrade to the latest version of the affected package.

Resolution

KDE users should upgrade to version 3.1.5 or later:

 # emerge sync
 
 # emerge -pv ">=kde-base/kde-3.1.5"
 # emerge ">=kde-base/kde-3.1.5"
OSVersionArchitecturePackageVersionFilename
Gentooanyallkde-base/kde<= 3.1.4UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.028 Low

EPSS

Percentile

90.5%