[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97559

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2011-1586

Date: (C)2011-04-26   (M)2017-08-18
 
CVSS Score: 5.8Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 4.9Authentication: NONE
 Confidentiality: NONE
 Integrity: PARTIAL
 Availability: PARTIAL











Directory traversal vulnerability in the KGetMetalink::File::isValidNameAttr function in ui/metalinkcreator/metalinker.cpp in KGet in KDE SC 4.6.2 and earlier allows remote attackers to create arbitrary files via a .. (dot dot) in the name attribute of a file element in a metalink file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-1000.

Reference:
SECUNIA-44124
SECUNIA-44329
ADV-2011-1019
ADV-2011-1021
ADV-2011-1135
MDVSA-2011:081
RHSA-2011:0465
USN-1114-1
http://openwall.com/lists/oss-security/2011/04/15/9
http://websvn.kde.org/branches/KDE/4.4/kdenetwork/kget/ui/metalinkcreator/metalinker.cpp?r1=1227468&r2=1227467&pathrev=1227468
http://websvn.kde.org/branches/KDE/4.5/kdenetwork/kget/ui/metalinkcreator/metalinker.cpp?r1=1227469&r2=1227468&pathrev=1227469
http://websvn.kde.org/branches/KDE/4.6/kdenetwork/kget/ui/metalinkcreator/metalinker.cpp?r1=1227471&r2=1227470&pathrev=1227471
https://bugzilla.redhat.com/show_bug.cgi?id=697042
https://launchpad.net/bugs/757526
kget-name-directory-traversal(66826)

CPE    62
cpe:/a:kde:kde_sc:4.0.0:beta4
cpe:/a:kde:kde_sc:4.0.0:beta3
cpe:/a:kde:kde_sc:4.0.0:beta2
cpe:/a:kde:kde_sc:4.0.0:beta1
...
CWE    1
CWE-22
OVAL    3
oval:org.secpod.oval:def:500236
oval:org.secpod.oval:def:700488
oval:org.secpod.oval:def:301009

© 2013 SecPod Technologies