[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97559

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2010-1000

Date: (C)2010-05-17   (M)2017-08-18
 
CVSS Score: 5.8Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 4.9Authentication: NONE
 Confidentiality: NONE
 Integrity: PARTIAL
 Availability: PARTIAL











Directory traversal vulnerability in KGet in KDE SC 4.0.0 through 4.4.3 allows remote attackers to create arbitrary files via directory traversal sequences in the name attribute of a file element in a metalink file.

Reference:
SECTRACK-1023984
http://www.securityfocus.com/archive/1/archive/1/511281/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/511281/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/511294/100/0/threaded
SECUNIA-39528
SECUNIA-39787
BID-40141
SECUNIA-42423
OSVDB-64690
ADV-2010-1142
ADV-2010-1144
ADV-2010-3096
ADV-2011-1101
FEDORA-2010-18029
FEDORA-2011-5211
MDVSA-2010:098
SUSE-SR:2010:024
USN-938-1
http://marc.info/?l=oss-security&m=127378789518426&w=2
http://secunia.com/secunia_research/2010-69/
http://www.kde.org/info/security/advisory-20100513-1.txt
kde-name-directory-traversal(58628)

CPE    53
cpe:/a:kde:kde_sc:4.0.0:beta4
cpe:/a:kde:kde_sc:4.0.0:beta3
cpe:/a:kde:kde_sc:4.0.0:beta2
cpe:/a:kde:kde_sc:4.0.0:beta1
...
CWE    1
CWE-22
OVAL    72
oval:org.secpod.oval:def:103074
oval:org.secpod.oval:def:100918
oval:org.secpod.oval:def:100404
oval:org.secpod.oval:def:100885
...

© 2013 SecPod Technologies