It was discovered that KGet did not properly perform input validation when
processing metalink files. If a user were tricked into opening a crafted
metalink file, a remote attacker could overwrite files via directory
traversal, which could eventually lead to arbitrary code execution.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 9.10 | noarch | kget | < 4:4.3.2-0ubuntu4.5 | UNKNOWN |
Ubuntu | 9.10 | noarch | kde-zeroconf | < 4:4.3.2-0ubuntu4.5 | UNKNOWN |
Ubuntu | 9.10 | noarch | kdenetwork-dbg | < 4:4.3.2-0ubuntu4.5 | UNKNOWN |
Ubuntu | 9.10 | noarch | kdenetwork-filesharing | < 4:4.3.2-0ubuntu4.5 | UNKNOWN |
Ubuntu | 9.10 | noarch | kopete | < 4:4.3.2-0ubuntu4.5 | UNKNOWN |
Ubuntu | 9.10 | noarch | kppp | < 4:4.3.2-0ubuntu4.5 | UNKNOWN |
Ubuntu | 9.10 | noarch | krdc | < 4:4.3.2-0ubuntu4.5 | UNKNOWN |
Ubuntu | 9.10 | noarch | krfb | < 4:4.3.2-0ubuntu4.5 | UNKNOWN |
Ubuntu | 9.10 | noarch | libkopete-dev | < 4:4.3.2-0ubuntu4.5 | UNKNOWN |
Ubuntu | 9.10 | noarch | libkopete4 | < 4:4.3.2-0ubuntu4.5 | UNKNOWN |