CERTA-2004-AVI-007
Vulnerability from certfr_avis
Une vulnérabilité de kdepim dans la gestion des fichiers VCF permet à un utilisateur d'élever ses privilèges.
Description
kdepim (KDE Personal Information Management suite) est un ensemble d'applications permettant la gestion des messages electroniques, des tâches, des rendez-vous et des correspondants. Un débordement de mémoire local dans kdepim permet à un utilisateur mal intentionné, construisant habilement un fichier de type VCF, de réaliser une élévation de privilèges et d'exécuter du code arbitraire sur la machine victime.
Solution
Mettre à jour kdepim selon votre distribution (cf. section documentation).
Toutes les versions de kdepim incluses dans KDE en version antérieure à la version 3.1.5.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eToutes les versions de \u003cTT\u003ekdepim\u003c/TT\u003e incluses dans KDE en version ant\u00e9rieure \u00e0 la version 3.1.5.\u003c/p\u003e",
"content": "## Description\n\nkdepim (KDE Personal Information Management suite) est un ensemble\nd\u0027applications permettant la gestion des messages electroniques, des\nt\u00e2ches, des rendez-vous et des correspondants. Un d\u00e9bordement de m\u00e9moire\nlocal dans kdepim permet \u00e0 un utilisateur mal intentionn\u00e9, construisant\nhabilement un fichier de type VCF, de r\u00e9aliser une \u00e9l\u00e9vation de\nprivil\u00e8ges et d\u0027ex\u00e9cuter du code arbitraire sur la machine victime.\n\n## Solution\n\nMettre \u00e0 jour kdepim selon votre distribution (cf. section\ndocumentation).\n",
"cves": [],
"initial_release_date": "2004-01-15T00:00:00",
"last_revision_date": "2004-05-12T00:00:00",
"links": [
{
"title": "Avis de s\u00e9curit\u00e9 FreeBSD du 15 avril 2004 :",
"url": "http://www.vuxml.org/freebsd/"
},
{
"title": "Avis de s\u00e9curit\u00e9 Slackware SSA:2004-014-01 :",
"url": "http://www.slackware.com/lists/archive/viewer.php?l=slackware-security\u0026y=2004\u0026m=slackware-security.442811"
},
{
"title": "Avis de s\u00e9curit\u00e9 RedHat RHSA-2004:006-04 :",
"url": "http://rhn.redhat.com/errata/RHSA-2004-006.html"
},
{
"title": "Avis de s\u00e9curit\u00e9 Mandrake MDKSA-2004:003 :",
"url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:003"
},
{
"title": "Avis de s\u00e9curit\u00e9 Gentoo GLSA 200404-02 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200404-02.xml"
}
],
"reference": "CERTA-2004-AVI-007",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2004-01-15T00:00:00.000000"
},
{
"description": "ajout du bulletin de s\u00e9curit\u00e9 Gentoo.",
"revision_date": "2004-04-07T00:00:00.000000"
},
{
"description": "ajout r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 de FreeBSD.",
"revision_date": "2004-05-12T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 de kdepim dans la gestion des fichiers VCF permet \u00e0 un\nutilisateur d\u0027\u00e9lever ses privil\u00e8ges.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans kdepim",
"vendor_advisories": [
{
"published_at": null,
"title": "Avis de s\u00e9curit\u00e9 KDE 20040114-1",
"url": "http://www.kde.org/info/security/advisory-20040114-1.txt"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…