Vulnerabilities > CVE-2003-0204 - Unspecified vulnerability in KDE
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
KDE 2 and KDE 3.1.1 and earlier 3.x versions allows attackers to execute arbitrary commands via (1) PostScript (PS) or (2) PDF files, related to missing -dPARANOIDSAFER and -dSAFER arguments when using the kghostview Ghostscript viewer.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 18 |
Nessus
NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2003-049.NASL description A vulnerability was discovered by the KDE team in the way that KDE uses Ghostscript for processing PostScript and PDF files. A malicious attacker could provide a carefully constructed PDF or PostScript file to an end user (via web or mail) that could lead to the execution of arbitrary commands as the user viewing the file. The vulnerability can be triggered even by the browser generating a directory listing with thumbnails. All users are encouraged to upgrade to these new kdegraphics, kdebase, and kdelibs packages that contain patches to correct the problem. This issue is corrected upstream in KDE 3.0.5b and KDE 3.1.1a. Update : The previous update was missing a fix in kdebase specific to HP machines. This has been corrected. last seen 2020-06-01 modified 2020-06-02 plugin id 14033 published 2004-07-31 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/14033 title Mandrake Linux Security Advisory : kde3 (MDKSA-2003:049-1) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Mandrake Linux Security Advisory MDKSA-2003:049. # The text itself is copyright (C) Mandriva S.A. # include("compat.inc"); if (description) { script_id(14033); script_version ("1.18"); script_cvs_date("Date: 2019/08/02 13:32:46"); script_cve_id("CVE-2003-0204"); script_xref(name:"MDKSA", value:"2003:049-1"); script_name(english:"Mandrake Linux Security Advisory : kde3 (MDKSA-2003:049-1)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value: "The remote Mandrake Linux host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "A vulnerability was discovered by the KDE team in the way that KDE uses Ghostscript for processing PostScript and PDF files. A malicious attacker could provide a carefully constructed PDF or PostScript file to an end user (via web or mail) that could lead to the execution of arbitrary commands as the user viewing the file. The vulnerability can be triggered even by the browser generating a directory listing with thumbnails. All users are encouraged to upgrade to these new kdegraphics, kdebase, and kdelibs packages that contain patches to correct the problem. This issue is corrected upstream in KDE 3.0.5b and KDE 3.1.1a. Update : The previous update was missing a fix in kdebase specific to HP machines. This has been corrected." ); script_set_attribute( attribute:"see_also", value:"http://www.kde.org/info/security/advisory-20030409-1.txt" ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:kdebase"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:kdebase-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:kdebase-kdm"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:kdebase-nsplugins"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:9.1"); script_set_attribute(attribute:"patch_publication_date", value:"2003/04/24"); script_set_attribute(attribute:"plugin_publication_date", value:"2004/07/31"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc."); script_family(english:"Mandriva Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux"); if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu); flag = 0; if (rpm_check(release:"MDK9.1", cpu:"i386", reference:"kdebase-3.1-83.3mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK9.1", cpu:"i386", reference:"kdebase-devel-3.1-83.3mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK9.1", cpu:"i386", reference:"kdebase-kdm-3.1-83.3mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK9.1", cpu:"i386", reference:"kdebase-nsplugins-3.1-83.3mdk", yank:"mdk")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-284.NASL description The KDE team discovered a vulnerability in the way KDE uses Ghostscript software for processing of PostScript (PS) and PDF files. An attacker could provide a malicious PostScript or PDF file via mail or websites that could lead to executing arbitrary commands under the privileges of the user viewing the file or when the browser generates a directory listing with thumbnails. last seen 2020-06-01 modified 2020-06-02 plugin id 15121 published 2004-09-29 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/15121 title Debian DSA-284-1 : kdegraphics - insecure execution code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DSA-284. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(15121); script_version("1.18"); script_cvs_date("Date: 2019/08/02 13:32:17"); script_cve_id("CVE-2003-0204"); script_bugtraq_id(7318); script_xref(name:"DSA", value:"284"); script_name(english:"Debian DSA-284-1 : kdegraphics - insecure execution"); script_summary(english:"Checks dpkg output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security-related update." ); script_set_attribute( attribute:"description", value: "The KDE team discovered a vulnerability in the way KDE uses Ghostscript software for processing of PostScript (PS) and PDF files. An attacker could provide a malicious PostScript or PDF file via mail or websites that could lead to executing arbitrary commands under the privileges of the user viewing the file or when the browser generates a directory listing with thumbnails." ); script_set_attribute( attribute:"see_also", value:"http://www.kde.org/info/security/advisory-20030409-1.txt" ); script_set_attribute( attribute:"see_also", value:"http://www.debian.org/security/2003/dsa-284" ); script_set_attribute( attribute:"solution", value: "Upgrade the kdegraphics and associated packages. For the stable distribution (woody) this problem has been fixed in version 2.2.2-6.11 of kdegraphics and associated packages. The old stable distribution (potato) is not affected since it does not contain KDE. For the unofficial backport of KDE 3.1.1 to woody by Ralf Nolden on download.kde.org, this problem has been fixed in version 3.1.1-0woody2 of kdegraphics. Using the normal backport line for apt-get you will get the update : deb http://download.kde.org/stable/latest/Debian stable main" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:kdegraphics"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.0"); script_set_attribute(attribute:"patch_publication_date", value:"2003/04/12"); script_set_attribute(attribute:"plugin_publication_date", value:"2004/09/29"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"3.0", prefix:"kamera", reference:"2.2.2-6.11")) flag++; if (deb_check(release:"3.0", prefix:"kcoloredit", reference:"2.2.2-6.11")) flag++; if (deb_check(release:"3.0", prefix:"kfract", reference:"2.2.2-6.11")) flag++; if (deb_check(release:"3.0", prefix:"kghostview", reference:"2.2.2-6.11")) flag++; if (deb_check(release:"3.0", prefix:"kiconedit", reference:"2.2.2-6.11")) flag++; if (deb_check(release:"3.0", prefix:"kooka", reference:"2.2.2-6.11")) flag++; if (deb_check(release:"3.0", prefix:"kpaint", reference:"2.2.2-6.11")) flag++; if (deb_check(release:"3.0", prefix:"kruler", reference:"2.2.2-6.11")) flag++; if (deb_check(release:"3.0", prefix:"ksnapshot", reference:"2.2.2-6.11")) flag++; if (deb_check(release:"3.0", prefix:"kview", reference:"2.2.2-6.11")) flag++; if (deb_check(release:"3.0", prefix:"libkscan-dev", reference:"2.2.2-6.11")) flag++; if (deb_check(release:"3.0", prefix:"libkscan1", reference:"2.2.2-6.11")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-296.NASL description The KDE team discovered a vulnerability in the way KDE uses Ghostscript software for processing of PostScript (PS) and PDF files. An attacker could provide a malicious PostScript or PDF file via mail or websites that could lead to executing arbitrary commands under the privileges of the user viewing the file or when the browser generates a directory listing with thumbnails. last seen 2020-06-01 modified 2020-06-02 plugin id 15133 published 2004-09-29 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/15133 title Debian DSA-296-1 : kdebase - insecure execution code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DSA-296. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(15133); script_version("1.18"); script_cvs_date("Date: 2019/08/02 13:32:17"); script_cve_id("CVE-2003-0204"); script_bugtraq_id(7318); script_xref(name:"DSA", value:"296"); script_name(english:"Debian DSA-296-1 : kdebase - insecure execution"); script_summary(english:"Checks dpkg output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security-related update." ); script_set_attribute( attribute:"description", value: "The KDE team discovered a vulnerability in the way KDE uses Ghostscript software for processing of PostScript (PS) and PDF files. An attacker could provide a malicious PostScript or PDF file via mail or websites that could lead to executing arbitrary commands under the privileges of the user viewing the file or when the browser generates a directory listing with thumbnails." ); script_set_attribute( attribute:"see_also", value:"http://www.debian.org/security/2003/dsa-296" ); script_set_attribute( attribute:"solution", value: "Upgrade the kdebase and associated packages. For the stable distribution (woody) this problem has been fixed in version 2.2.2-14.4 of kdebase and associated packages. The old stable distribution (potato) is not affected since it does not contain KDE. For the unofficial backport of KDE 3.1.1 to woody by Ralf Nolden on download.kde.org, this problem has been fixed in version 3.1.1-0woody3 of kdebase. Using the normal backport line for apt-get you will get the update : deb http://download.kde.org/stable/latest/Debian stable main" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:kdebase"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.0"); script_set_attribute(attribute:"patch_publication_date", value:"2003/04/30"); script_set_attribute(attribute:"plugin_publication_date", value:"2004/09/29"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"3.0", prefix:"kate", reference:"2.2.2-14.4")) flag++; if (deb_check(release:"3.0", prefix:"kdebase", reference:"2.2.2-14.4")) flag++; if (deb_check(release:"3.0", prefix:"kdebase-audiolibs", reference:"2.2.2-14.4")) flag++; if (deb_check(release:"3.0", prefix:"kdebase-dev", reference:"2.2.2-14.4")) flag++; if (deb_check(release:"3.0", prefix:"kdebase-doc", reference:"2.2.2-14.4")) flag++; if (deb_check(release:"3.0", prefix:"kdebase-libs", reference:"2.2.2-14.4")) flag++; if (deb_check(release:"3.0", prefix:"kdewallpapers", reference:"2.2.2-14.4")) flag++; if (deb_check(release:"3.0", prefix:"kdm", reference:"2.2.2-14.4")) flag++; if (deb_check(release:"3.0", prefix:"konqueror", reference:"2.2.2-14.4")) flag++; if (deb_check(release:"3.0", prefix:"konsole", reference:"2.2.2-14.4")) flag++; if (deb_check(release:"3.0", prefix:"kscreensaver", reference:"2.2.2-14.4")) flag++; if (deb_check(release:"3.0", prefix:"libkonq-dev", reference:"2.2.2-14.4")) flag++; if (deb_check(release:"3.0", prefix:"libkonq3", reference:"2.2.2-14.4")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2003-146.NASL description This erratum provides updated KDE packages to resolve a vulnerability in the handling of PostScript and PDF files. KDE is a graphical desktop environment for the X Window System. KDE versions up to and including KDE 3.1.1 have a vulnerability caused by neglecting to use the -dSAFER option when previewing in Konquerer. An attacker can prepare a malicious PostScript or PDF file which provides the attacker with access to the victim last seen 2020-06-01 modified 2020-06-02 plugin id 12389 published 2004-07-06 reporter This script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/12389 title RHEL 2.1 : kdebase (RHSA-2003:146) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Red Hat Security Advisory RHSA-2003:146. The text # itself is copyright (C) Red Hat, Inc. # include("compat.inc"); if (description) { script_id(12389); script_version ("1.27"); script_cvs_date("Date: 2019/10/25 13:36:10"); script_cve_id("CVE-2003-0204"); script_xref(name:"RHSA", value:"2003:146"); script_name(english:"RHEL 2.1 : kdebase (RHSA-2003:146)"); script_summary(english:"Checks the rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote Red Hat host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "This erratum provides updated KDE packages to resolve a vulnerability in the handling of PostScript and PDF files. KDE is a graphical desktop environment for the X Window System. KDE versions up to and including KDE 3.1.1 have a vulnerability caused by neglecting to use the -dSAFER option when previewing in Konquerer. An attacker can prepare a malicious PostScript or PDF file which provides the attacker with access to the victim's account and privileges when the victim opens this malicious file for viewing, or when the victim browses a directory containing this malicious file with file previews enabled in the browser. This erratum provides packages containing KDE 2.2.2 with backported patches to correct these issues." ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2003-0204" ); # http://www.kde.org/info/security/advisory-20030409-1.txt script_set_attribute( attribute:"see_also", value:"https://www.kde.org/info/security/advisory-20030409-1.txt" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2003:146" ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:arts"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kdebase"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kdebase-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kdegraphics"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kdegraphics-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kdelibs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kdelibs-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kdelibs-sound"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kdelibs-sound-devel"); script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:2.1"); script_set_attribute(attribute:"vuln_publication_date", value:"2003/05/05"); script_set_attribute(attribute:"patch_publication_date", value:"2003/06/19"); script_set_attribute(attribute:"plugin_publication_date", value:"2004/07/06"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Red Hat Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat"); os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat"); os_ver = os_ver[1]; if (! preg(pattern:"^2\.1([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 2.1", "Red Hat " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu); if (cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i386", cpu); yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo"); if (!empty_or_null(yum_updateinfo)) { rhsa = "RHSA-2003:146"; yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa); if (!empty_or_null(yum_report)) { security_report_v4( port : 0, severity : SECURITY_HOLE, extra : yum_report ); exit(0); } else { audit_message = "affected by Red Hat security advisory " + rhsa; audit(AUDIT_OS_NOT, audit_message); } } else { flag = 0; if (rpm_check(release:"RHEL2.1", cpu:"i386", reference:"arts-2.2.2-7")) flag++; if (rpm_check(release:"RHEL2.1", cpu:"i386", reference:"kdebase-2.2.2-9")) flag++; if (rpm_check(release:"RHEL2.1", cpu:"i386", reference:"kdebase-devel-2.2.2-9")) flag++; if (rpm_check(release:"RHEL2.1", cpu:"i386", reference:"kdegraphics-2.2.2-4")) flag++; if (rpm_check(release:"RHEL2.1", cpu:"i386", reference:"kdegraphics-devel-2.2.2-4")) flag++; if (rpm_check(release:"RHEL2.1", cpu:"i386", reference:"kdelibs-2.2.2-7")) flag++; if (rpm_check(release:"RHEL2.1", cpu:"i386", reference:"kdelibs-devel-2.2.2-7")) flag++; if (rpm_check(release:"RHEL2.1", cpu:"i386", reference:"kdelibs-sound-2.2.2-7")) flag++; if (rpm_check(release:"RHEL2.1", cpu:"i386", reference:"kdelibs-sound-devel-2.2.2-7")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_HOLE, extra : rpm_report_get() + redhat_report_package_caveat() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "arts / kdebase / kdebase-devel / kdegraphics / kdegraphics-devel / etc"); } }
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-293.NASL description The KDE team discovered a vulnerability in the way KDE uses Ghostscript software for processing of PostScript (PS) and PDF files. An attacker could provide a malicious PostScript or PDF file via mail or websites that could lead to executing arbitrary commands under the privileges of the user viewing the file or when the browser generates a directory listing with thumbnails. last seen 2020-06-01 modified 2020-06-02 plugin id 15130 published 2004-09-29 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/15130 title Debian DSA-293-1 : kdelibs - insecure execution
Redhat
advisories |
|
References
- http://bugs.kde.org/show_bug.cgi?id=53343
- http://bugs.kde.org/show_bug.cgi?id=56808
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000668
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000747
- http://marc.info/?l=bugtraq&m=105001557020141&w=2
- http://marc.info/?l=bugtraq&m=105012994719099&w=2
- http://marc.info/?l=bugtraq&m=105017403010459&w=2
- http://marc.info/?l=bugtraq&m=105034222521369&w=2
- http://www.debian.org/security/2003/dsa-284
- http://www.debian.org/security/2003/dsa-293
- http://www.debian.org/security/2003/dsa-296
- http://www.kde.org/info/security/advisory-20030409-1.txt
- http://www.mandriva.com/security/advisories?name=MDKSA-2003:049
- http://www.redhat.com/support/errata/RHSA-2003-002.html