Advisory ID
Betroffene Versionen
9.0 i586


Vulnerabilities were discovered in the KIO subsystem support for various network protocols. The implementation of the rlogin protocol affects all KDE versions from 2.1 up to 3.0.4, while the flawed implementation of the telnet protocol only affects KDE 2.x. They allow a carefully crafted URL in an HTML page, HTML email, or other KIO-enabled application to execute arbitrary commands as the victim with their privilege. The KDE team provided a patch for KDE3 which has been applied in these packages. No patch was provided for KDE2, however the KDE team recommends disabling both the rlogin and telnet KIO protocols. This can be accomplished by removing, as root, the following files: /usr/share/services/telnet.protocol and /usr/share/services/rlogin.protocol. If either file also exists in a user's ~/.kde/share/services directory, they should likewise be removed.

Aktualisierte Pakete

9.0 i586

 d6780b7aec9597a2d3482a3c9e41f123  9.0/RPMS/kdelibs-3.0.3-30.1mdk.i586.rpm
49969b33154f33f5f61eee3873a76ae3  9.0/RPMS/kdelibs-devel-3.0.3-30.1mdk.i586.rpm
f2258f8538a6b32803167f3045ad5963  9.0/SRPMS/kdelibs-3.0.3-30.1mdk.src.rpm