Vulnerabilities > CVE-2006-0019 - Unspecified vulnerability in KDE
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN kde
nessus
Summary
Heap-based buffer overflow in the encodeURI and decodeURI functions in the kjs JavaScript interpreter engine in KDE 3.2.0 through 3.5.0 allows remote attackers to execute arbitrary code via a crafted, UTF-8 encoded URI.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 17 |
Nessus
NASL family Fedora Local Security Checks NASL id FEDORA_2006-050.NASL description A heap overflow flaw was discovered affecting kjs, the JavaScript interpreter engine used by Konqueror and other parts of KDE. An attacker could create a malicious website containing carefully crafted JavaScript code that would trigger this flaw and possibly lead to arbitrary code execution. The Common Vulnerabilities and Exposures project assigned the name CVE-2006-0019 to this issue. Users of KDE should upgrade to these updated packages, which contain a backported patch from the KDE security team correcting this issue Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 20756 published 2006-01-21 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/20756 title Fedora Core 4 : kdelibs-3.5.0-0.4.fc4 (2006-050) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-245-1.NASL description Maksim Orlovich discovered that kjs, the JavaScript interpreter engine used by Konqueror and other parts of KDE, did not sufficiently verify the validity of UTF-8 encoded URIs. Specially crafted URIs could trigger a buffer overflow. By tricking an user into visiting a website with malicious JavaScript code, a remote attacker could exploit this to execute arbitrary code with user privileges. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 20792 published 2006-01-21 reporter Ubuntu Security Notice (C) 2006-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/20792 title Ubuntu 5.04 / 5.10 : kdelibs vulnerability (USN-245-1) NASL family SuSE Local Security Checks NASL id SUSE_SA_2006_003.NASL description The remote host is missing the patch for the advisory SUSE-SA:2006:003 (kdelibs3). Maksim Orlovich discovered a bug in the JavaScript interpreter used by Konqueror. UTF-8 encoded URLs could lead to a buffer overflow that causes the browser to crash or execute arbitrary code. Attackers could trick users into visiting specially crafted web sites that exploit this bug (CVE-2006-0019). last seen 2020-06-01 modified 2020-06-02 plugin id 20758 published 2006-01-21 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/20758 title SUSE-SA:2006:003: kdelibs3 NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2006-019.NASL description A heap overflow vulnerability was discovered in kjs, the KDE JavaScript interpretter engine. An attacker could create a malicious web site that contained carefully crafted JavaScript code that could trigger the flaw and potentially lead to the arbitrary execution of code as the user visiting the site. The updated packages have been patched to correct this problem. last seen 2020-06-01 modified 2020-06-02 plugin id 20797 published 2006-01-22 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/20797 title Mandrake Linux Security Advisory : kdelibs (MDKSA-2006:019) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-948.NASL description Maksim Orlovich discovered that the kjs JavaScript interpreter, used in the Konqueror web browser and in other parts of KDE, performs insufficient bounds checking when parsing UTF-8 encoded Uniform Resource Identifiers, which may lead to a heap based buffer overflow and the execution of arbitrary code. last seen 2020-06-01 modified 2020-06-02 plugin id 22814 published 2006-10-14 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/22814 title Debian DSA-948-1 : kdelibs - buffer overflow NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200601-11.NASL description The remote host is affected by the vulnerability described in GLSA-200601-11 (KDE kjs: URI heap overflow vulnerability) Maksim Orlovich discovered an incorrect bounds check in kjs when handling URIs. Impact : By enticing a user to load a specially crafted webpage containing malicious JavaScript, an attacker could execute arbitrary code with the rights of the user running kjs. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 20798 published 2006-01-23 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/20798 title GLSA-200601-11 : KDE kjs: URI heap overflow vulnerability NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2006-0184.NASL description Updated kdelibs packages are now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. kdelibs contains libraries for the K Desktop Environment (KDE). A heap overflow flaw was discovered affecting kjs, the JavaScript interpreter engine used by Konqueror and other parts of KDE. An attacker could create a malicious website containing carefully crafted JavaScript code that would trigger this flaw and possibly lead to arbitrary code execution. The Common Vulnerabilities and Exposures project assigned the name CVE-2006-0019 to this issue. NOTE: this issue does not affect KDE in Red Hat Enterprise Linux 3 or 2.1. Users of KDE should upgrade to these updated packages, which contain a backported patch from the KDE security team correcting this issue as well as two bug fixes. last seen 2020-06-01 modified 2020-06-02 plugin id 21981 published 2006-07-05 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/21981 title CentOS 4 : kdelibs (CESA-2006:0184) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2006-0184.NASL description Updated kdelibs packages are now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. kdelibs contains libraries for the K Desktop Environment (KDE). A heap overflow flaw was discovered affecting kjs, the JavaScript interpreter engine used by Konqueror and other parts of KDE. An attacker could create a malicious website containing carefully crafted JavaScript code that would trigger this flaw and possibly lead to arbitrary code execution. The Common Vulnerabilities and Exposures project assigned the name CVE-2006-0019 to this issue. NOTE: this issue does not affect KDE in Red Hat Enterprise Linux 3 or 2.1. Users of KDE should upgrade to these updated packages, which contain a backported patch from the KDE security team correcting this issue as well as two bug fixes. last seen 2020-06-01 modified 2020-06-02 plugin id 20753 published 2006-01-20 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/20753 title RHEL 4 : kdelibs (RHSA-2006:0184) NASL family Slackware Local Security Checks NASL id SLACKWARE_SSA_2006-045-05.NASL description New kdelibs packages are available for Slackware 10.0, 10.1, and 10.2 to fix a security issue with kjs. last seen 2020-06-01 modified 2020-06-02 plugin id 20916 published 2006-02-15 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/20916 title Slackware 10.0 / 10.1 / 10.2 : kdelibs (SSA:2006-045-05)
Oval
accepted | 2013-04-29T04:16:00.303-04:00 | ||||||||||||
class | vulnerability | ||||||||||||
contributors |
| ||||||||||||
definition_extensions |
| ||||||||||||
description | Heap-based buffer overflow in the encodeURI and decodeURI functions in the kjs JavaScript interpreter engine in KDE 3.2.0 through 3.5.0 allows remote attackers to execute arbitrary code via a crafted, UTF-8 encoded URI. | ||||||||||||
family | unix | ||||||||||||
id | oval:org.mitre.oval:def:11858 | ||||||||||||
status | accepted | ||||||||||||
submitted | 2010-07-09T03:56:16-04:00 | ||||||||||||
title | Heap-based buffer overflow in the encodeURI and decodeURI functions in the kjs JavaScript interpreter engine in KDE 3.2.0 through 3.5.0 allows remote attackers to execute arbitrary code via a crafted, UTF-8 encoded URI. | ||||||||||||
version | 26 |
Redhat
advisories |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
rpms |
|
References
- ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.3-kdelibs-kjs.diff
- ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.3-kdelibs-kjs.diff
- http://secunia.com/advisories/18500
- http://secunia.com/advisories/18500
- http://secunia.com/advisories/18540
- http://secunia.com/advisories/18540
- http://secunia.com/advisories/18552
- http://secunia.com/advisories/18552
- http://secunia.com/advisories/18559
- http://secunia.com/advisories/18559
- http://secunia.com/advisories/18561
- http://secunia.com/advisories/18561
- http://secunia.com/advisories/18570
- http://secunia.com/advisories/18570
- http://secunia.com/advisories/18583
- http://secunia.com/advisories/18583
- http://secunia.com/advisories/18899
- http://secunia.com/advisories/18899
- http://securityreason.com/securityalert/364
- http://securityreason.com/securityalert/364
- http://securitytracker.com/id?1015512
- http://securitytracker.com/id?1015512
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.361107
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.361107
- http://www.debian.org/security/2006/dsa-948
- http://www.debian.org/security/2006/dsa-948
- http://www.gentoo.org/security/en/glsa/glsa-200601-11.xml
- http://www.gentoo.org/security/en/glsa/glsa-200601-11.xml
- http://www.kde.org/info/security/advisory-20060119-1.txt
- http://www.kde.org/info/security/advisory-20060119-1.txt
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:019
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:019
- http://www.osvdb.org/22659
- http://www.osvdb.org/22659
- http://www.redhat.com/support/errata/RHSA-2006-0184.html
- http://www.redhat.com/support/errata/RHSA-2006-0184.html
- http://www.securityfocus.com/archive/1/422464/100/0/threaded
- http://www.securityfocus.com/archive/1/422464/100/0/threaded
- http://www.securityfocus.com/archive/1/422489/100/0/threaded
- http://www.securityfocus.com/archive/1/422489/100/0/threaded
- http://www.securityfocus.com/archive/1/427976/100/0/threaded
- http://www.securityfocus.com/archive/1/427976/100/0/threaded
- http://www.securityfocus.com/bid/16325
- http://www.securityfocus.com/bid/16325
- http://www.ubuntu.com/usn/usn-245-1
- http://www.ubuntu.com/usn/usn-245-1
- http://www.vupen.com/english/advisories/2006/0265
- http://www.vupen.com/english/advisories/2006/0265
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24242
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24242
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11858
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11858