Vulnerability   
Search   
    Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.51906
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2005:325
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory RHSA-2005:325.

The kdelibs package provides libraries for the K Desktop Environment.

The International Domain Name (IDN) support in the Konqueror browser
allowed remote attackers to spoof domain names using punycode encoded
domain names. Such domain names are decoded in URLs and SSL certificates
in a way that uses homograph characters from other character sets, which
facilitates phishing attacks. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2005-0237 to this issue.

Sebastian Krahmer discovered a flaw in dcopserver, the KDE Desktop
Communication Protocol (DCOP) daemon. A local user could use this flaw to
stall the DCOP authentication process, affecting any local desktop users
and causing a reduction in their desktop functionality. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CVE-2005-0396 to this issue.

A flaw in the dcopidlng script was discovered. The dcopidlng script would
create temporary files with predictable filenames which could allow local
users to overwrite arbitrary files via a symlink attack. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CVE-2005-0365 to this issue.

Users of KDE should upgrade to these erratum packages which contain
backported patches to correct these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2005-325.html
http://www.kde.org/info/security/advisory-20050316-3.txt
http://www.kde.org/info/security/advisory-20050316-2.txt
http://www.kde.org/info/security/advisory-20050316-1.txt

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-0237
BugTraq ID: 12461
http://www.securityfocus.com/bid/12461
http://www.securityfocus.com/archive/1/427976/100/0/threaded
http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031460.html
http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html
http://www.mandriva.com/security/advisories?name=MDKSA-2005:058
http://www.shmoo.com/idn
http://www.shmoo.com/idn/homograph.txt
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10671
http://www.redhat.com/support/errata/RHSA-2005-325.html
http://secunia.com/advisories/14162
XForce ISS Database: multiple-browsers-idn-spoof(19236)
https://exchange.xforce.ibmcloud.com/vulnerabilities/19236
Common Vulnerability Exposure (CVE) ID: CVE-2005-0365
Bugtraq: 20050211 insecure temporary file creation in kdelibs 3.3.2 (Google Search)
http://marc.info/?l=bugtraq&m=110814653804757&w=2
http://fedoranews.org/updates/FEDORA-2005-245.shtml
http://security.gentoo.org/glsa/glsa-200503-14.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2005:045
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10676
http://securitytracker.com/id?1013525
http://secunia.com/advisories/14254
Common Vulnerability Exposure (CVE) ID: CVE-2005-0396
BugTraq ID: 12820
http://www.securityfocus.com/bid/12820
Bugtraq: 20050316 Multiple KDE Security Advisories (2005-03-16) (Google Search)
http://marc.info/?l=bugtraq&m=111099766716483&w=2
http://security.gentoo.org/glsa/glsa-200503-22.xml
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10432
http://www.redhat.com/support/errata/RHSA-2005-307.html
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.