Summary
The remote host is missing an update to kdenetwork announced via advisory DSA 214-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20214-1
Insight
Olaf Kirch from SuSE Linux AG discovered another vulnerability in the klisa package, that provides a LAN information service similar to Network Neighbourhood. The lisa daemon contains a buffer overflow vulnerability which potentially enables any local user, as well any any remote attacker on the LAN who is able to gain control of the LISa port (7741 by default), to obtain root privileges. In addition, a remote attacker potentially may be able to gain access to a victim's account by using an rlan:// URL in an HTML page or via another KDE application.
This problem has been fixed in version 2.2.2-14.5 for the current stable distribution (woody) and in version 2.2.2-14.20 for the unstable distribution (sid). The old stable distribution (potato) is not affected since it doesn't contain a kdenetwork package.
We recommend that you upgrade your klisa package immediately.
Severity
Classification
-
CVE CVE-2002-1306 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities