Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59611
Category:Fedora Local Security Checks
Title:Fedora Core 6 FEDORA-2007-716 (kdebase)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to kdebase
announced via advisory FEDORA-2007-716.

Core applications for the K Desktop Environment. Included are: kdm
(replacement for xdm), kwin (window manager), konqueror (filemanager,
web browser, ftp client, ...), konsole (xterm replacement), kpanel
(application starter and desktop pager), kaudio (audio server),
kdehelp (viewer for kde help files, info and man pages), kthememgr
(system for managing alternate theme packages) plus other KDE
components (kcheckpass, kikbd, kscreensaver, kcontrol, kfind,
kfontmanager, kmenuedit).


* Tue Oct 2 2007 Than Ngo - 6:3.5.7-1.fc6
- CVE-2007-4224, CVE-2007-4225, CVE-2007-3820
- rh#299741, CVE-2007-4569
* Mon Jul 2 2007 Than Ngo - 6:3.5.7-0.fc6.2
- fix #244906

Solution: Apply the appropriate updates.

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/


This update can be installed with the 'yum' update program. Use 'yum update
package-name' at the command line. For more information, refer to 'Managing
Software with yum,' available at http://fedora.redhat.com/docs/yum/.


http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2007-716

Risk factor : High

CVSS Score:
6.8

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-4224
BugTraq ID: 25219
http://www.securityfocus.com/bid/25219
Bugtraq: 20070806 Konqueror: URL address bar spoofing vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/475689/100/0/threaded
Bugtraq: 20070806 Re: Konqueror: URL address bar spoofing vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/475731/100/0/threaded
Bugtraq: 20070806 Re: Konqueror: URL address bar spoofingvulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/475730/100/0/threaded
Bugtraq: 20070807 Re: [Full-disclosure] Konqueror: URL address bar spoofing vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/475763/100/0/threaded
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00022.html
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00085.html
http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065101.html
http://www.mandriva.com/security/advisories?name=MDKSA-2007:176
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9879
http://www.redhat.com/support/errata/RHSA-2007-0905.html
http://www.redhat.com/support/errata/RHSA-2007-0909.html
http://securitytracker.com/id?1018579
http://secunia.com/advisories/26351
http://secunia.com/advisories/26612
http://secunia.com/advisories/26690
http://secunia.com/advisories/26720
http://secunia.com/advisories/27089
http://secunia.com/advisories/27090
http://secunia.com/advisories/27096
http://secunia.com/advisories/27106
http://secunia.com/advisories/27108
http://secunia.com/advisories/27271
http://securityreason.com/securityalert/2982
SuSE Security Announcement: SUSE-SR:2007:021 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html
http://www.ubuntu.com/usn/usn-502-1
http://www.vupen.com/english/advisories/2007/2807
XForce ISS Database: konqueror-setinterval-spoofing(35828)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35828
Common Vulnerability Exposure (CVE) ID: CVE-2007-4225
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00084.html
XForce ISS Database: konqueror-data-spoofing(35829)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35829
Common Vulnerability Exposure (CVE) ID: CVE-2007-3820
BugTraq ID: 24912
http://www.securityfocus.com/bid/24912
BugTraq ID: 24918
http://www.securityfocus.com/bid/24918
Bugtraq: 20070713 Opera/Konqueror: data: URL scheme address bar spoofing (Google Search)
http://www.securityfocus.com/archive/1/473703/100/0/threaded
Bugtraq: 20070714 Re: Opera/Konqueror: data: URL scheme address bar spoofing (Google Search)
http://www.securityfocus.com/archive/1/473712/100/0/threaded
http://alt.swiecki.net/oper1.html
http://osvdb.org/37242
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10345
http://www.securitytracker.com/id?1018396
http://secunia.com/advisories/26091
http://securityreason.com/securityalert/2905
http://www.vupen.com/english/advisories/2007/2538
XForce ISS Database: opera-konqueror-addressbar-spoofing(35430)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35430
Common Vulnerability Exposure (CVE) ID: CVE-2007-4569
1018724
http://securitytracker.com/id?1018724
25730
http://www.securityfocus.com/bid/25730
26894
http://secunia.com/advisories/26894
26904
http://secunia.com/advisories/26904
26915
http://secunia.com/advisories/26915
26929
http://secunia.com/advisories/26929
26977
http://secunia.com/advisories/26977
27089
27096
27106
27180
http://secunia.com/advisories/27180
27271
ADV-2007-3227
http://www.vupen.com/english/advisories/2007/3227
DSA-1376
http://www.debian.org/security/2007/dsa-1376
FEDORA-2007-2361
FEDORA-2007-716
GLSA-200710-15
http://security.gentoo.org/glsa/glsa-200710-15.xml
MDKSA-2007:190
http://www.mandriva.com/security/advisories?name=MDKSA-2007:190
RHSA-2007:0905
SUSE-SR:2007:021
USN-517-1
http://www.ubuntu.com/usn/usn-517-1
http://www.kde.org/info/security/advisory-20070919-1.txt
https://issues.rpath.com/browse/RPL-1725
kde-kdm-login-security-bypass(36711)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36711
oval:org.mitre.oval:def:10359
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10359
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.