Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.56206
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-245-1 (kdelibs)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to kdelibs
announced via advisory USN-245-1.

A security issue affects the following Ubuntu releases:

Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected: kdelibs4c2

Maksim Orlovich discovered that kjs, the Javascript interpreter engine
used by Konqueror and other parts of KDE, did not sufficiently verify
the validity of UTF-8 encoded URIs. Specially crafted URIs could
trigger a buffer overflow. By tricking an user into visiting a
web site with malicious JavaScript code, a remote attacker could
exploit this to execute arbitrary code with user privileges.

Solution:
The problem can be corrected by upgrading the affected package to
version 4:3.4.0-0ubuntu3.5 (for Ubuntu 5.04), or 4:3.4.3-0ubuntu2 (for
Ubuntu 5.10). After a standard system upgrade you need to restart
your KDE session to effect the necessary changes.

https://secure1.securityspace.com/smysecure/catid.html?in=USN-245-1

Risk factor : High

CVSS Score:
7.5

Cross-Ref: BugTraq ID: 16325
Common Vulnerability Exposure (CVE) ID: CVE-2006-0019
1015512
http://securitytracker.com/id?1015512
16325
http://www.securityfocus.com/bid/16325
18500
http://secunia.com/advisories/18500
18540
http://secunia.com/advisories/18540
18552
http://secunia.com/advisories/18552
18559
http://secunia.com/advisories/18559
18561
http://secunia.com/advisories/18561
18570
http://secunia.com/advisories/18570
18583
http://secunia.com/advisories/18583
18899
http://secunia.com/advisories/18899
20060119 [KDE Security Advisory] kjs encodeuri/decodeuri heap overflow
http://www.securityfocus.com/archive/1/422464/100/0/threaded
22659
http://www.osvdb.org/22659
364
http://securityreason.com/securityalert/364
ADV-2006-0265
http://www.vupen.com/english/advisories/2006/0265
DSA-948
http://www.debian.org/security/2006/dsa-948
FLSA:178606
http://www.securityfocus.com/archive/1/427976/100/0/threaded
GLSA-200601-11
http://www.gentoo.org/security/en/glsa/glsa-200601-11.xml
MDKSA-2006:019
http://www.mandriva.com/security/advisories?name=MDKSA-2006:019
RHSA-2006:0184
http://www.redhat.com/support/errata/RHSA-2006-0184.html
SSA:2006-045-05
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.361107
SUSE-SA:2006:003
http://www.securityfocus.com/archive/1/422489/100/0/threaded
USN-245-1
http://www.ubuntu.com/usn/usn-245-1
ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.3-kdelibs-kjs.diff
http://www.kde.org/info/security/advisory-20060119-1.txt
kde-kjs-bo(24242)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24242
oval:org.mitre.oval:def:11858
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11858
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.