Summary
The remote host is missing an update to kdelibs
announced via advisory DSA 204-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20204-1
Insight
The KDE team has discovered a vulnerability in the support for various network protocols via the KIO The implementation of the rlogin and protocol allows a carefully crafted URL in an HTML page, HTML email or other KIO-enabled application to execute arbitrary commands on the system using the victim's account on the vulnerable machine.
This problem has been fixed by disabling rlogin and telnet in version 2.2.2-13.woody.5 for the current stable distribution (woody) and in version 2.2.2-14.1 for the unstable distribution (sid). The old stable distribution (potato) is not affected since it doesn't contain KDE.
This problem has been fixed by disabling rlogin and telnet in version 2.2.2-13.woody.5 for the current stable distribution (woody). The old stable distribution (potato) is not affected since it doesn't contain KDE. A correction for the package in the unstable distribution (sid) is not yet available.
We recommend that you upgrade your kdelibs3 package immediately.
Severity
Classification
-
CVE CVE-2002-1281, CVE-2002-1282 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities