Lucene search

K
nessusThis script is Copyright (C) 2005-2021 Tenable Network Security, Inc.SUSE_SA_2005_022.NASL
HistoryApr 12, 2005 - 12:00 a.m.

SUSE-SA:2005:022: kdelibs3

2005-04-1200:00:00
This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.
www.tenable.com
11

The remote host is missing the patch for the advisory SUSE-SA:2005:022 (kdelibs3).

Several vulnerabilities have been identified and fixed in the KDE desktop environment.

  • A buffer overflow via specially crafted PCX pictures was fixed.

This could lead to a remote attacker being able to execute code as the user opening or viewing a PCX images. This PCX image could have been embedded within a web page or Email.

This affects SUSE Linux 9.1 up to 9.3, SUSE Linux Enterprise Server 9 and Novell Linux Desktop 9.

  • The IDN domain name cloaking problem was fixed.

A remote website could disguise its name as another potentially trusted site by using a extension originally meant for non-ASCII domain names by using ‘homographs’ which look exactly like other letters.

The fix used by KDE is only use homographs for trusted domains.
It is disabled by default for the .net, .com and .org domains.

This issue exists in SUSE Linux 9.1 and 9.2, SUSE Linux Enterprise Server 9 and Novell Linux Desktop 9. It has been assigned the Mitre CVE ID CVE-2005-0233.

  • A denial of service attack against the DCOP service was fixed.

A local user could cause another users KDE session to visible hang by writing bad data to the world-writable DCOP socket. The socket has been made writable only for the user itself.

This was found by Sebastian Krahmer of SUSE Security.

This affects all SUSE Linux versions, except SUSE Linux 9.3.
Updates for SUSE Linux up to 9.0 and SUSE Linux Enterprise Server 8 are not included for this minor issue. They will be included should a later security update for different issues be necessary.

This is tracked by the Mitre CVE ID CVE-2005-0396.

Additionally following bug was fixed:

  • A possible race in the DNS resolver causing unresolved hosts in rare cases was fixed. This only affected SUSE Linux 9.3.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# This plugin text was extracted from SuSE Security Advisory SUSE-SA:2005:022
#


if ( ! defined_func("bn_random") ) exit(0);

include('deprecated_nasl_level.inc');
include('compat.inc');

if(description)
{
 script_id(18014);
 script_version("1.12");
 script_cve_id("CVE-2005-0237", "CVE-2005-0396");
 
 name["english"] = "SUSE-SA:2005:022: kdelibs3";
 
 script_name(english:name["english"]);
 
 script_set_attribute(attribute:"synopsis", value:
"The remote host is missing a vendor-supplied security patch" );
 script_set_attribute(attribute:"description", value:
"The remote host is missing the patch for the advisory SUSE-SA:2005:022 (kdelibs3).


Several vulnerabilities have been identified and fixed in the KDE
desktop environment.

- A buffer overflow via specially crafted PCX pictures was fixed.

This could lead to a remote attacker being able to execute code
as the user opening or viewing a PCX images. This PCX image could
have been embedded within a web page or Email.

This affects SUSE Linux 9.1 up to 9.3, SUSE Linux Enterprise Server
9 and Novell Linux Desktop 9.


- The IDN domain name cloaking problem was fixed.

A remote website could disguise its name as another potentially
trusted site by using a extension originally meant for non-ASCII
domain names by using 'homographs' which look exactly like other
letters.

The fix used by KDE is only use homographs for trusted domains.
It is disabled by default for the .net, .com and .org domains.

This issue exists in SUSE Linux 9.1 and 9.2, SUSE Linux Enterprise
Server 9 and Novell Linux Desktop 9.  It has been assigned the
Mitre CVE ID  CVE-2005-0233.


- A denial of service attack against the DCOP service was fixed.

A local user could cause another users KDE session to visible hang
by writing bad data to the world-writable DCOP socket. The socket
has been made writable only for the user itself.

This was found by Sebastian Krahmer of SUSE Security.

This affects all SUSE Linux versions, except SUSE Linux 9.3.
Updates for SUSE Linux up to 9.0 and SUSE Linux Enterprise Server
8 are not included for this minor issue. They will be included
should a later security update for different issues be necessary.

This is tracked by the Mitre CVE ID CVE-2005-0396.

Additionally following bug was fixed:

- A possible race in the DNS resolver causing unresolved hosts in rare
cases was fixed.  This only affected SUSE Linux 9.3." );
 script_set_attribute(attribute:"solution", value:
"http://www.suse.de/security/advisories/2005_22_kdelibs3.html" );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N");




 script_set_attribute(attribute:"plugin_publication_date", value: "2005/04/12");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
 script_end_attributes();

 
 summary["english"] = "Check for the version of the kdelibs3 package";
 script_summary(english:summary["english"]);
 
 script_category(ACT_GATHER_INFO);
 
 script_copyright(english:"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.");
 family["english"] = "SuSE Local Security Checks";
 script_family(english:family["english"]);
 
 script_dependencies("ssh_get_info.nasl");
 script_require_keys("Host/SuSE/rpm-list");
 exit(0);
}

include("rpm.inc");
if ( rpm_check( reference:"kdelibs3-3.2.1-44.46", release:"SUSE9.1") )
{
 security_warning(0);
 exit(0);
}
if ( rpm_check( reference:"kdelibs3-3.3.0-34.5", release:"SUSE9.2") )
{
 security_warning(0);
 exit(0);
}
if ( rpm_check( reference:"kdelibs3-3.4.0-20.3", release:"SUSE9.3") )
{
 security_warning(0);
 exit(0);
}
if (rpm_exists(rpm:"kdelibs3-", release:"SUSE9.1")
 || rpm_exists(rpm:"kdelibs3-", release:"SUSE9.2")
 || rpm_exists(rpm:"kdelibs3-", release:"SUSE9.3") )
{
 set_kb_item(name:"CVE-2005-0237", value:TRUE);
 set_kb_item(name:"CVE-2005-0396", value:TRUE);
}