CERTA-2004-AVI-007
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité de kdepim dans la gestion des fichiers VCF permet à un utilisateur d'élever ses privilèges.
Description
kdepim (KDE Personal Information Management suite) est un ensemble d'applications permettant la gestion des messages electroniques, des tâches, des rendez-vous et des correspondants. Un débordement de mémoire local dans kdepim permet à un utilisateur mal intentionné, construisant habilement un fichier de type VCF, de réaliser une élévation de privilèges et d'exécuter du code arbitraire sur la machine victime.
Solution
Mettre à jour kdepim selon votre distribution (cf. section documentation).
Toutes les versions de kdepim incluses dans KDE en version antérieure à la version 3.1.5.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eToutes les versions de \u003cTT\u003ekdepim\u003c/TT\u003e incluses dans KDE en version ant\u00e9rieure \u00e0 la version 3.1.5.\u003c/p\u003e",
"content": "## Description\n\nkdepim (KDE Personal Information Management suite) est un ensemble\nd\u0027applications permettant la gestion des messages electroniques, des\nt\u00e2ches, des rendez-vous et des correspondants. Un d\u00e9bordement de m\u00e9moire\nlocal dans kdepim permet \u00e0 un utilisateur mal intentionn\u00e9, construisant\nhabilement un fichier de type VCF, de r\u00e9aliser une \u00e9l\u00e9vation de\nprivil\u00e8ges et d\u0027ex\u00e9cuter du code arbitraire sur la machine victime.\n\n## Solution\n\nMettre \u00e0 jour kdepim selon votre distribution (cf. section\ndocumentation).\n",
"cves": [],
"links": [
{
"title": "Avis de s\u00e9curit\u00e9 FreeBSD du 15 avril 2004 :",
"url": "http://www.vuxml.org/freebsd/"
},
{
"title": "Avis de s\u00e9curit\u00e9 Slackware SSA:2004-014-01 :",
"url": "http://www.slackware.com/lists/archive/viewer.php?l=slackware-security\u0026y=2004\u0026m=slackware-security.442811"
},
{
"title": "Avis de s\u00e9curit\u00e9 RedHat RHSA-2004:006-04 :",
"url": "http://rhn.redhat.com/errata/RHSA-2004-006.html"
},
{
"title": "Avis de s\u00e9curit\u00e9 Mandrake MDKSA-2004:003 :",
"url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:003"
},
{
"title": "Avis de s\u00e9curit\u00e9 Gentoo GLSA 200404-02 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200404-02.xml"
}
],
"reference": "CERTA-2004-AVI-007",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2004-01-15T00:00:00.000000"
},
{
"description": "ajout du bulletin de s\u00e9curit\u00e9 Gentoo.",
"revision_date": "2004-04-07T00:00:00.000000"
},
{
"description": "ajout r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 de FreeBSD.",
"revision_date": "2004-05-12T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 de kdepim dans la gestion des fichiers VCF permet \u00e0 un\nutilisateur d\u0027\u00e9lever ses privil\u00e8ges.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans kdepim",
"vendor_advisories": [
{
"published_at": null,
"title": "Avis de s\u00e9curit\u00e9 KDE 20040114-1",
"url": "http://www.kde.org/info/security/advisory-20040114-1.txt"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…