|
COMMAND KDE arbitrary code execution using ghostscript SYSTEMS AFFECTED versions 3.1.x prior to 3.1.1a versions prior to 3.0.5b PROBLEM In KDE Security Advisory [http://www.kde.org/info/security/advisory-20030409-1.txt]: KDE uses Ghostscript software for processing of PostScript (PS) and PDF files in a way that allows for the execution of arbitrary commands that can be contained in such files. An attacker can prepare a malicious PostScript or PDF file which will provide the attacker with access to the victim's account and privileges when the victim opens this malicious file for viewing or when the victim browses a directory containing such malicious file and has file previews enabled. An attacker can provide malicious files remotely to a victim in an e-mail, as part of a webpage, via an ftp server and possible other means. The vulnerabilities potentially enable local or remote attackers to compromise the privacy of a vicitim's data and to execute arbitrary shell commands with the victim's privileges, such as erasing files or accessing or modifying data. SOLUTION Upgrade to latest version.