|Category:||Red Hat Local Security Checks|
|Title:||RedHat Security Advisory RHSA-2004:074|
The remote host is missing updates announced in
Konqueror is a file manager and Web browser for the K Desktop Environment
Flaws have been found in the cookie path handling between a number of Web
browsers and servers. The HTTP cookie standard allows a Web server
supplying a cookie to a client to specify a subset of URLs on the origin
server to which the cookie applies. Web servers such as Apache do not
filter returned cookies and assume that the client will only send back
cookies for requests that fall within the server-supplied subset of URLs.
However, by supplying URLs that use path traversal (/../) and character
encoding, it is possible to fool many browsers into sending a cookie to a
path outside of the originally-specified subset.
KDE version 3.1.3 and later include a patch to Konquerer that disables the
sending of cookies to the server if the URL contains such encoded
traversals. Red Hat Enterprise Linux 2.1 shipped with KDE 2.2.2 and
is therefore vulnerable to this issue.
Users of Konquerer are advised to upgrade to these erratum packages, which
contain a backported patch for this issue.
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date
Risk factor : High
Common Vulnerability Exposure (CVE) ID: CVE-2003-0592|
Debian Security Information: DSA-459 (Google Search)
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.