Lucene search

K
slackwareSlackware Linux ProjectSSA-2004-247-01
HistorySep 04, 2004 - 5:01 a.m.

[slackware-security] kde

2004-09-0405:01:35
Slackware Linux Project
www.slackware.com
20

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.022 Low

EPSS

Percentile

89.3%

New kdelibs and kdebase packages are available for Slackware 9.1, 10.0,
and -current to fix security issues.

More details about this issues may be found in the Common
Vulnerabilities and Exposures (CVE) database:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0689
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0690
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0721
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0746

Here are the details from the Slackware 10.0 ChangeLog:

Fri Sep 3 13:13:09 PDT 2004
patches/packages/kdebase-3.2.3-i486-2.tgz: Patched frame injection
vulnerability in Konqueror. For more details, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0721
(* Security fix )
patches/packages/kdelibs-3.2.3-i486-2.tgz: Patched unsafe temporary directory
usage, cross-domain cookie injection vulnerability for certain country
specific domains, and frame injection vulnerability in Konqueror.
For more details, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0689
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0690
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0721
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0746
(
Security fix *)

Where to find the new packages:

Updated packages for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/kdebase-3.1.4-i486-2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/kdelibs-3.1.4-i486-3.tgz

Updated packages for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/kdebase-3.2.3-i486-2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/kdelibs-3.2.3-i486-2.tgz

Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/kde/kdebase-3.2.3-i486-2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/kde/kdelibs-3.2.3-i486-2.tgz

MD5 signatures:

Slackware 9.1 packages:
296fc0b2d31c5914b08ab54332312cf9 kdebase-3.1.4-i486-2.tgz
c0de072389daeb6bd8a1cde2ed1dc8ef kdelibs-3.1.4-i486-3.tgz

Slackware 10.0 packages:
528edca97f8d6c412742fa8f817abd76 kdebase-3.2.3-i486-2.tgz
8eabfa597ea805ceb457933d36e144be kdelibs-3.2.3-i486-2.tgz

Slackware -current packages:
528edca97f8d6c412742fa8f817abd76 kdebase-3.2.3-i486-2.tgz
8eabfa597ea805ceb457933d36e144be kdelibs-3.2.3-i486-2.tgz

Installation instructions:

Upgrade the packages as root:
> upgradepkg kdebase-3.2.3-i486-2.tgz kdelibs-3.2.3-i486-2.tgz

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.022 Low

EPSS

Percentile

89.3%