- Advisory ID
- Betroffene Versionen
- 9.0 i586
Vulnerabilities were discovered in the KIO subsystem support for various network protocols. The implementation of the rlogin protocol affects all KDE versions from 2.1 up to 3.0.4, while the flawed implementation of the telnet protocol only affects KDE 2.x. They allow a carefully crafted URL in an HTML page, HTML email, or other KIO-enabled application to execute arbitrary commands as the victim with their privilege. The KDE team provided a patch for KDE3 which has been applied in these packages. No patch was provided for KDE2, however the KDE team recommends disabling both the rlogin and telnet KIO protocols. This can be accomplished by removing, as root, the following files: /usr/share/services/telnet.protocol and /usr/share/services/rlogin.protocol. If either file also exists in a user's ~/.kde/share/services directory, they should likewise be removed.
d6780b7aec9597a2d3482a3c9e41f123 9.0/RPMS/kdelibs-3.0.3-30.1mdk.i586.rpm 49969b33154f33f5f61eee3873a76ae3 9.0/RPMS/kdelibs-devel-3.0.3-30.1mdk.i586.rpm f2258f8538a6b32803167f3045ad5963 9.0/SRPMS/kdelibs-3.0.3-30.1mdk.src.rpm