|Category:||Mandrake Local Security Checks|
|Title:||Mandrake Security Advisory MDKSA-2004:022 (kdelibs)|
The remote host is missing an update to kdelibs
announced via advisory MDKSA-2004:022.
Corsaire discovered that a number of HTTP user agents contained a flaw
in how they handle cookies. This flaw could allow an attacker to
avoid the path restrictions specified by a cookie's originator.
According to their advisory:
The cookie specifications detail a path argument that can be used to
restrict the areas of a host that will be exposed to a cookie. By
using standard traversal techniques this functionality can be
subverted, potentially exposing the cookie to scrutiny and use in
This issue was fixed in KDE 3.1.3
the updated packages are patched to
protect against this vulnerability.
Affected versions: 9.1
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
Risk factor : High
Common Vulnerability Exposure (CVE) ID: CVE-2003-0592|
Debian Security Information: DSA-459 (Google Search)
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.