__________________________________________________________
The U.S. Department of Energy
Computer Incident Advisory Capability
___ __ __ _ ___
/ | /_\ /
\___ __|__ / \ \___
__________________________________________________________
INFORMATION BULLETIN
Red Hat Multiple Vulnerabilities in KDE
[Red Hat Security Advisory RHSA-2002:220-40]
December 4, 2002 20:00 GMT Number N-020
______________________________________________________________________________
PROBLEM: A number of vulnerabilities have been found that affect various
versions of KDE (K Desktop Environment). Vulnerabilities
include a remote attacker spoofing certificates of trusted
sites through a man-in-the-middle attack, and a local or remote
attacker executing arbitrary code through a carefully crafted
URL.
SOFTWARE: * Red Hat Linux 7.2
* Red Hat Linux 7.3
* Red Hat Linux 8.0
DAMAGE: It is possible by exploiting these vulnerabilities a remote
attacker may be able to run code of choice, and obtain root
privileges.
SOLUTION: Apply patches as stated in Red Hat's bulletin.
______________________________________________________________________________
VULNERABILITY The risk is HIGH. KDE is a graphical desktop environment for
ASSESSMENT: the X Window System and is commonly included in Linux systems.
______________________________________________________________________________
LINKS:
CIAC BULLETIN: http://www.ciac.org/ciac/bulletins/n-020.shtml
ORIGINAL BULLETIN: https://rhn.redhat.com/errata/RHSA-2002-220.html
______________________________________________________________________________
[***** Start Red Hat Security Advisory RHSA-2002:220-40 *****]
Updated KDE packages fix security issues
Advisory: RHSA-2002:220-40
Last updated on: 2002-12-04
Affected Products: Red Hat Linux 7.2
Red Hat Linux 7.3
Red Hat Linux 8.0
CVEs (cve.mitre.org): CAN-2002-0838
CAN-2002-0970
CAN-2002-1151
CAN-2002-1152
CAN-2002-1223
CAN-2002-1224
CAN-2002-1247
CAN-2002-1281
CAN-2002-1282
CAN-2002-1306
Security Advisory
Details:
A number of vulnerabilities have been found that affect various versions of
KDE. This errata provides updates which resolve these issues.
KDE is a graphical desktop environment for the X Window System.
A number of vulnerabilities have been found in various versions of KDE.
The SSL capability for Konqueror in KDE 3.0.2 and earlier does not verify
the Basic Constraints for an intermediate CA-signed certificate. This
allows remote attackers to spoof the certificates of trusted sites via a
man-in-the-middle attack. The Common Vulnerabilities and Exposures project
has assigned the name CAN-2002-0970 to this issue.
Konqueror in KDE 3.0 through 3.0.2 does not properly detect the "secure"
flag in an HTTP cookie, which could cause Konqueror to send the cookie
across an unencrypted channel, potentially allowing remote attackers to
steal the cookie via sniffing. (CAN-2002-1152)
The cross-site scripting protection for Konqueror in KDE 2.2.2 and 3.0
through 3.0.3 does not properly initialize the domains on sub-frames and
sub-iframes, which can allow remote attackers to execute scripts and steal
cookies from subframes that are in other domains. (CAN-2002-1151)
kpf is a file sharing utility that can be docked into the KDE kicker bar.
It uses a subset of the HTTP protocol internally and acts in a manner very
similar to a Web server. A feature added in KDE 3.0.1 accidentally allowed
retrieving any file, not limited to the configured shared directory, if it
is readable by the user under which kpf runs. (CAN-2002-1224)
KGhostview includes a parser from GSview, which is vulnerable to a buffer
overflow while parsing a specially crafted .ps input file.
(CAN-2002-1223). It also contains code from gv 3.5.x which is vulnerable
to another buffer overflow triggered by malformed postscript or Adobe PDF
files. (CAN-2002-0838)
A vulnerability in the rlogin KIO subsystem (rlogin.protocol) of
KDE 2.x 2.1 and later, and KDE 3.x 3.0.4 and earlier, allows local and
remote attackers to execute arbitrary code via a carefully crafted URL.
The Common Vulnerabilities and Exposures project has assigned the name
CAN-2002-1281 to this issue. A similar vulnerability affects KDE version
2.x through the telnet KIO subsystem (telnet.protocol). (CAN-2002-1282)
Multiple buffer overflows exist in the KDE LAN browsing implementation; the
resLISa daemon contains a buffer overflow vulnerability which could be
exploited if the reslisa binary is SUID root. Additionally, the lisa
daemon contains a vulnerability which potentially enables any local user,
as well any any remote attacker on the LAN who is able to gain control of
the LISa port (7741 by default), to obtain root privileges. In Red Hat
Linux, reslisa is not SUID root and lisa services are not automatically
started. (CAN-2002-1247, CAN-2002-1306)
Red Hat Linux 8.0 shipped with KDE 3.0.3 and is therefore vulnerable to
CAN-2002-0838, CAN-2002-1151, CAN-2002-1223, CAN-2002-1224, CAN-2002-1247,
and CAN-2002-1281. This errata includes new kdelibs and kdenetwork packages
which contain patches to correct these issues.
Red Hat Linux 7.3 shipped with KDE 3.0.0 and is therefore vulnerable to
CAN-2002-0838, CAN-2002-0970, CAN-2002-1151, CAN-2002-1152,
CAN-2002-1223, CAN-2002-1247, CAN-2002-1281, and CAN-2002-1306. This
errata upgrades Red Hat Linux 7.3 to KDE 3.0.3 with patches to correct
these issues.
Red Hat Linux 7.2 shipped with KDE version 2.2.2 and is therefore
vulnerable to CAN-2002-0838, CAN-2002-0970, CAN-2002-1151, CAN-2002-1223,
CAN-2002-1247, and CAN-2002-1306. This errata provides new kdelibs and
kdenetwork packages which contain patches to correct these issues.
Red Hat Linux 7.2 is also vulnerable to CAN-2002-1281 and CAN-2002-1282 but
these vulnerabilities are not fixed by these errata packages. At the
present time Red Hat recommends disabling both the rlogin and telnet KIO
protocols as a workaround. To disable both protocols, execute these commands:
rm /usr/share/services/rlogin.protocol
rm /usr/share/services/telnet.protocol
Updated packages:
Red Hat Linux 7.2
--------------------------------------------------------------------------------
SRPMS:
kdegraphics-2.2.2-2.1.src.rpm ea399e31bcca1df0b7aef78c303ca0a7
kdelibs-2.2.2-3.src.rpm 034a08a13b62f72b6a9603f52f16da25
kdenetwork-2.2.2-2.src.rpm 81714c79f92d1e9b6de4b38543a9bc83
i386:
arts-2.2.2-3.i386.rpm c9be246b033cd8e17a0777183f060bdc
kdegraphics-2.2.2-2.1.i386.rpm 1668cdc5ff3cb4476626287cfff646ac
kdegraphics-devel-2.2.2-2.1.i386.rpm 1f7c2cc26b71d0bef278c29259b9e28d
kdelibs-2.2.2-3.i386.rpm 1753fcef6366b9c10dae05876855db5f
kdelibs-devel-2.2.2-3.i386.rpm 9c21f59d69acb690892fd13b02bd23aa
kdelibs-sound-2.2.2-3.i386.rpm 929bf62240d8e8129fb09a965dc4bc75
kdelibs-sound-devel-2.2.2-3.i386.rpm cd858cb38ea684aaf6c22f0093dbbfad
kdenetwork-2.2.2-2.i386.rpm 567f7d10e7f11200a1ede4fc48ee6ba8
kdenetwork-ppp-2.2.2-2.i386.rpm 0181fc55d957f081697dec9ab3c4eef4
ia64:
arts-2.2.2-3.ia64.rpm 4b7e057bd214027d4c492265b3a71d6a
kdegraphics-2.2.2-2.1.ia64.rpm bf45c07ac04d081839934549f9fba336
kdegraphics-devel-2.2.2-2.1.ia64.rpm 07bb5515069e7d63470921b18a338989
kdelibs-2.2.2-3.ia64.rpm 189201842b61ec0eda4cd790e0eb8f9e
kdelibs-devel-2.2.2-3.ia64.rpm e325b6fd962803c296320656e7a3579b
kdelibs-sound-2.2.2-3.ia64.rpm aa788c8abe086b78cf16ffd0d4d26466
kdelibs-sound-devel-2.2.2-3.ia64.rpm b58b22df69edd4b776ae1df8f641139d
kdenetwork-2.2.2-2.ia64.rpm 0f824cdab51bdbafc654081e2d8c9e56
kdenetwork-ppp-2.2.2-2.ia64.rpm 17ed308dac97dff15b511d55316523d9
Red Hat Linux 7.3
--------------------------------------------------------------------------------
SRPMS:
arts-1.0.3-0.7.1.src.rpm 47dcc91fe8726cc45f31014a29b35a1c
kde-i18n-3.0.3-0.7.3.src.rpm e2dbe16652886c5e938932e9db0b76ab
kdeaddons-3.0.3-0.7.src.rpm 1a1bf3945b93dca80460f9d0c496ded2
kdeadmin-3.0.3-0.7.src.rpm 88bd547a198b3b0ce44e4cfdc1b91bd2
kdeartwork-3.0.3-0.7.1.src.rpm 35508697a85ffaba96513085b18e77c7
kdebase-3.0.3-0.7.2.src.rpm 4252b1ec7cd6413b335702d15459f69a
kdebindings-3.0.3-0.7.1.src.rpm 2f77233d2019dcfdfaf5ba4e2294f47f
kdeedu-3.0.3-0.7.src.rpm 96b1c663ec0839e428b15f52e55a920b
kdegames-3.0.3-0.7.src.rpm 43fc3e29f684817f5f91242748e59181
kdegraphics-3.0.3-0.7.2.src.rpm a260fca5c6f4b52ea89c445a386690d0
kdelibs-3.0.3-0.7.2.src.rpm 0bb5c62332785c2daf1f15597d71a890
kdemultimedia-3.0.3-0.7.1.src.rpm 09b000c0e7ac6b2754a74bf3c3ac4fa3
kdenetwork-3.0.3-0.7.2.src.rpm 6d4354214bf9c201a15ee809a9857e13
kdepim-3.0.3-0.7.src.rpm f4f5657c7d14f05d01b00bb853c79c60
kdesdk-3.0.3-0.7.src.rpm 4b4527904b61e185d1805044a84953f1
kdetoys-3.0.3-0.7.src.rpm 430647cf44a607b6ac264060422f0f8d
kdeutils-3.0.3-0.7.src.rpm e712ea2315ea0800a3933e1695968a98
kdevelop-2.1.3-0.7.1.src.rpm fb0ca7e6c97ffb3957728689a743b296
qt-3.0.5-7.14.src.rpm 354d1a5d84ba9be926cd445d1f65cab3
i386:
ark-3.0.3-0.7.i386.rpm c31ac96ba6d0f3a9ebbb10d20985a5c8
arts-1.0.3-0.7.1.i386.rpm 68f6dcc3c862b8de79092d9aa7618d36
arts-devel-1.0.3-0.7.1.i386.rpm ff569116c2e9f9476b6c967207b7dc57
cervisia-3.0.3-0.7.i386.rpm d35f569dfbfe3c8f64930f4d0b84e63d
kaboodle-3.0.3-0.7.1.i386.rpm 6998bef27993940c4cfe628978fd3a22
kamera-3.0.3-0.7.2.i386.rpm e0e6b4869bef5c93628532d1957193fe
karm-3.0.3-0.7.i386.rpm 9434391849bf3ecaa98e729565634a21
kcalc-3.0.3-0.7.i386.rpm 59d8f61a6d57eb83fb29ea4ec9fb7e0d
kcharselect-3.0.3-0.7.i386.rpm b5b049e944cf27d481f40a05c64c124f
kcoloredit-3.0.3-0.7.2.i386.rpm 4f67d858333d89be5959a6fd70197b2c
kdeaddons-kate-3.0.3-0.7.i386.rpm 7fe44981d9f0da00fd85d6dcdcd1e464
kdeaddons-kicker-3.0.3-0.7.i386.rpm 154fd03b6325fc249b9d2db9f5c1bd3c
kdeaddons-knewsticker-3.0.3-0.7.i386.rpm 7b958fa5c3aa0a15e5a8f82c6acac846
kdeaddons-konqueror-3.0.3-0.7.i386.rpm 950f242a09d7bdf3ba77bd7ca6adcb23
kdeaddons-noatun-3.0.3-0.7.i386.rpm 7d3fef5e022b4480ae662c20c48ac965
kdeadmin-3.0.3-0.7.i386.rpm bfe34d25e617c3e25dc2faf77e716621
kdeartwork-3.0.3-0.7.1.i386.rpm 047c77f35776c564bca14cc4ffd146c4
kdeartwork-kworldclock-3.0.3-0.7.1.i386.rpm e59d14917ab3c03c897c3f92b53a758a
kdeartwork-locolor-3.0.3-0.7.1.i386.rpm 96bed63324f3c40ef57bc7aaf32caef9
kdeartwork-screensavers-3.0.3-0.7.1.i386.rpm 1a7c3633b753ca8effe5dfc046fd6ec5
kdebase-3.0.3-0.7.2.i386.rpm 2001ffaf4fcb9d56b25bff8f5b5d6c85
kdebase-devel-3.0.3-0.7.2.i386.rpm db9f97bd5b5721fdd2062d0aa2965547
kdebindings-3.0.3-0.7.1.i386.rpm e33ee4cd2e9301915787b2f4720af43c
kdebindings-devel-3.0.3-0.7.1.i386.rpm 344b64d1bca10210db411b32e01fb0f4
kdebindings-kmozilla-3.0.3-0.7.1.i386.rpm 8feb90886d6ac404a42207b20ff523c5
kdegames-3.0.3-0.7.i386.rpm 2c954338900c6894fbe1c45496bae318
kdegames-devel-3.0.3-0.7.i386.rpm e25d0a4def322accb91d3aa2aa1dafd0
kdelibs-3.0.3-0.7.2.i386.rpm 9a3d319eaadf9b0ff620c445eb6918e5
kdelibs-devel-3.0.3-0.7.2.i386.rpm 0f369a42384ace153710e585ce47e86e
kdemultimedia-arts-3.0.3-0.7.1.i386.rpm fe9794772b4c717fd7ac8ee94ab31b1b
kdemultimedia-devel-3.0.3-0.7.1.i386.rpm 94571620f5161cf37097534c63a9bf4b
kdemultimedia-kfile-3.0.3-0.7.1.i386.rpm d5b599eeeedcb46954024e231aaf66f1
kdemultimedia-libs-3.0.3-0.7.1.i386.rpm 135e008d033b7e78b45b8f4fe0250569
kdenetwork-devel-3.0.3-0.7.2.i386.rpm c53b4d182818205944fcf3612942c318
kdenetwork-libs-3.0.3-0.7.2.i386.rpm bb71a42d167e8539ecfd75156879f70c
kdepasswd-3.0.3-0.7.i386.rpm d65f4adea754e9ab38887c18f7cc4a8e
kdepim-3.0.3-0.7.i386.rpm 8d833c32134f1ed60ee1fbc08262008e
kdepim-cellphone-3.0.3-0.7.i386.rpm a12608b4aa87f056aa95fa7aca7a1273
kdepim-devel-3.0.3-0.7.i386.rpm 33b650a7088f065acc38f8b2558c7b67
kdepim-pilot-3.0.3-0.7.i386.rpm e137e8621fca2328d919b9735adbd719
kdesdk-gimp-3.0.3-0.7.i386.rpm 708568ca332d5cb4c545da99090c74db
kdesdk-kapptemplate-3.0.3-0.7.i386.rpm 915cb23acd612fb8879d8feb6d8e2cac
kdesdk-kbabel-3.0.3-0.7.i386.rpm 83c195e1f5e5932138d489bb3dc14663
kdesdk-kbugbuster-3.0.3-0.7.i386.rpm 228345769dd1cf1d3379906b215af9e2
kdesdk-kmtrace-3.0.3-0.7.i386.rpm 38f2efa7b18452a63bf0fde26bb78803
kdesdk-kompare-3.0.3-0.7.i386.rpm 9147d3be6cfb04f569c4f83e69c34d5e
kdesdk-kspy-3.0.3-0.7.i386.rpm 60f394c650b46645e1f9b1c5852727f8
kdessh-3.0.3-0.7.i386.rpm 8f1eda9703316c6638187b86e1c8c1e3
kdetoys-3.0.3-0.7.i386.rpm 938c1325cb89c9dc49932f4ee55d7f48
kdeutils-laptop-3.0.3-0.7.i386.rpm 4e0458b14e321cddb9820803516a3c4d
kdevelop-2.1.3-0.7.1.i386.rpm 828d671341da74f98207ccec83dd894d
kdf-3.0.3-0.7.i386.rpm a43492502f9724ef88e3757bd573c026
kdict-3.0.3-0.7.2.i386.rpm 7ce89dde28bc8ae992395c24f2136905
kdvi-3.0.3-0.7.2.i386.rpm 6a32f99fcf3f144a0ba79363dfe2c996
kedit-3.0.3-0.7.i386.rpm 93fe10821b08641e964f1e3957e32d37
keduca-3.0.3-0.7.i386.rpm 8a900a4900eb3c91bee96854c38f5896
kfax-3.0.3-0.7.2.i386.rpm 632d3c454dbde139231dff3154af7af1
kfile-pdf-3.0.3-0.7.2.i386.rpm 117c2803b365681a1bf91f682d725149
kfile-png-3.0.3-0.7.2.i386.rpm 2bec4e9cde3695289ba6a237e47a9407
kfloppy-3.0.3-0.7.i386.rpm 4c47d387dde4e63558d48bf84c72688c
kfract-3.0.3-0.7.2.i386.rpm 7b74f1789b2dcfbde592ee812c12b19a
kgeo-3.0.3-0.7.i386.rpm b699923f0c3df235f4bd68c370452081
kghostview-3.0.3-0.7.2.i386.rpm 3c2d55f5bdc429f89f110d10bb64b58d
khexedit-3.0.3-0.7.i386.rpm 91655d96af4ca3a1ca9f50e4e7e90bc4
kiconedit-3.0.3-0.7.2.i386.rpm 02c425ba7942358fd36be81db609088e
kit-3.0.3-0.7.2.i386.rpm 26db442ffbbaa1553c5c138a209207ae
kjots-3.0.3-0.7.i386.rpm 91fecfdefae0415b27339394d0f73be5
klettres-3.0.3-0.7.i386.rpm a0842ee9d0239070816f693ae4fdc2f6
kljettool-3.0.3-0.7.i386.rpm 7ad3798fce63da97f8f96f3bbba8a3d4
klpq-3.0.3-0.7.i386.rpm 4d747945f02676ffb75c978a57addb00
klprfax-3.0.3-0.7.i386.rpm 937ea72d67edb7cea2f8cf68fe1e6ec3
kmail-3.0.3-0.7.2.i386.rpm e9ee917df07ea4a6d5c53e3a0bfe5f16
kmessedwords-3.0.3-0.7.i386.rpm d175e65b4af6524d0672c0df3d3fffa2
kmid-3.0.3-0.7.1.i386.rpm 8cc3f07f5f2cc1c276af643b08233c22
kmidi-3.0.3-0.7.1.i386.rpm d5e79b13a53f09cc015e622911dc8fb4
kmix-3.0.3-0.7.1.i386.rpm dbec374bda1a631d3b886207204522fc
knewsticker-3.0.3-0.7.2.i386.rpm a020d8cd85bb2056789993eea951cecd
knode-3.0.3-0.7.2.i386.rpm 48c293f3b92b2115b20b967671530964
knotes-3.0.3-0.7.i386.rpm d87ffc5428a2bf0d05dba1be73e16cbd
koncd-3.0.3-0.7.1.i386.rpm e3f31e79286cd764cc7cf23f8c79129d
kooka-3.0.3-0.7.2.i386.rpm c1140b9165e173bc386367c887f3596c
korn-3.0.3-0.7.2.i386.rpm 88575c727577d629583b8db993e049ec
kpaint-3.0.3-0.7.2.i386.rpm efed4a1469974d3ef0eea80c83993050
kpf-3.0.3-0.7.2.i386.rpm b497fb2b80940ef02a1f56ed098fc326
kppp-3.0.3-0.7.2.i386.rpm 3b65942be18126d51756ec33bb0ebebc
kregexpeditor-3.0.3-0.7.i386.rpm 3c2c96eeb45e2882431c2ac8fa13b0ec
kregexpeditor-devel-3.0.3-0.7.i386.rpm c0973f7501ec7e0cccafcae0b16deae1
kruler-3.0.3-0.7.2.i386.rpm db88094cba76479eb3eb0c3c17f52398
kscd-3.0.3-0.7.1.i386.rpm 2a299ae6cf5ad38552c00fe661732c6e
ksirc-3.0.3-0.7.2.i386.rpm 929eb08ad90c06942db4f2ded6be06eb
ksnapshot-3.0.3-0.7.2.i386.rpm 11a8bb6c42df541d6b22ded6a9e3f060
kstars-3.0.3-0.7.i386.rpm 33085a4aba5134d5f16dad8b6f889837
ktalkd-3.0.3-0.7.2.i386.rpm b6f5bd8a53b07c8bd65fa009ba12afcf
ktimer-3.0.3-0.7.i386.rpm 2c8dae3e5fa5d4a7d18d6497fa01b353
ktouch-3.0.3-0.7.i386.rpm 91363efc95c0db868eb57ed89c4285fb
kuickshow-3.0.3-0.7.2.i386.rpm 8b1ad52acabfa8ed28ae12efc6a7b0f7
kview-3.0.3-0.7.2.i386.rpm 253c465d92fb923ec23dde728b3ef1e6
kviewshell-3.0.3-0.7.2.i386.rpm d41fb35ce2f805abffd42e2347029f13
kviewshell-devel-3.0.3-0.7.2.i386.rpm d3bc4f4b7c9c1516340a3b3f5c874439
kvoctrain-3.0.3-0.7.i386.rpm 4232a7548dad0e40f3b7e93d51951b5e
kxmlrpcd-3.0.3-0.7.2.i386.rpm 9e393ddfc49472320dbcaa394bfbfc52
libkscan-3.0.3-0.7.2.i386.rpm 71a0d83c0b8a1049d200743cac7be748
libkscan-devel-3.0.3-0.7.2.i386.rpm 40169395af0b83079f550087f88bf17b
lisa-3.0.3-0.7.2.i386.rpm 107b12e7ec4f43c41a83c44a8c1728f6
noatun-3.0.3-0.7.1.i386.rpm 402c7189e0e9fa0dd4e79a6d41e061bb
qt-3.0.5-7.14.i386.rpm 960b252e140edd4fde5df0c33c32f724
qt-designer-3.0.5-7.14.i386.rpm 89e26bf00fd8c606673144ddfe613d9b
qt-devel-3.0.5-7.14.i386.rpm 279ff020001cd6605346256a030f3e28
qt-MySQL-3.0.5-7.14.i386.rpm 042a38aabf9ff94bad8fd025035805c2
qt-ODBC-3.0.5-7.14.i386.rpm 84238622cf26b074764229a89cb507db
qt-PostgreSQL-3.0.5-7.14.i386.rpm 6ea56e8b818aa41913de389e36a8cc10
qt-static-3.0.5-7.14.i386.rpm aa7ad857e20ce146caf0f9cb53220ce7
qt-Xt-3.0.5-7.14.i386.rpm 8945494c65048dbb61dd413c44800945
Red Hat Linux 8.0
--------------------------------------------------------------------------------
SRPMS:
kde-i18n-3.0.3-2.src.rpm 382b75abdf9a6283816619bb6614f2a5
kdebase-3.0.3-14.src.rpm eb94d5dcf07bfc59bc25af2e4c8b365d
kdegraphics-3.0.3-5.src.rpm 461fd60d1643e1c31a278234aafdb871
kdelibs-3.0.3-8.3.src.rpm 89bacf26defe3ff0c3ce42c2cbd01ac3
kdenetwork-3.0.3-3.2.src.rpm 9a239e421bb3a3f9d9d3d10f834081b2
i386:
kamera-3.0.3-5.i386.rpm 1760f7c313bbaf68ba245e277dc0e311
kcoloredit-3.0.3-5.i386.rpm 446cf584b68467d9b963ac772fafcbbb
kdebase-3.0.3-14.i386.rpm dae6d36badd1d95e2c158f1b0fbc4a8b
kdebase-devel-3.0.3-14.i386.rpm 8c89468704d83340dcd2d4e8c3701241
kdelibs-3.0.3-8.3.i386.rpm 60301f8226f8a7446046153722483712
kdelibs-devel-3.0.3-8.3.i386.rpm b9e1c80782bfa0757e4464fb948d1dc2
kdenetwork-devel-3.0.3-3.2.i386.rpm 06ce97289ab90412d186e19fc615ea0f
kdenetwork-libs-3.0.3-3.2.i386.rpm d3c939799ab6930fcb2d1f21fa108bf7
kdict-3.0.3-3.2.i386.rpm 003adc9a793b09e7a628d5731970ddb3
kdvi-3.0.3-5.i386.rpm 32619c7f1cfa9923975554ca6398120b
kfax-3.0.3-5.i386.rpm 6cd4586916cd0d1188516d26060115c9
kfile-pdf-3.0.3-5.i386.rpm e5589af68b5a603e907b5f1bfb2490a2
kfile-png-3.0.3-5.i386.rpm e9a05f7b8d2568fc75c184c9426a58d2
kfract-3.0.3-5.i386.rpm 13bdd632276190ab9a33aff390d626ab
kghostview-3.0.3-5.i386.rpm 53b7219215d58dc474a134619c4ce27b
kiconedit-3.0.3-5.i386.rpm 3bddeec68060feab62c78556e7e921b0
kit-3.0.3-3.2.i386.rpm 90bb1850c6360a87a30a88028f08c265
kmail-3.0.3-3.2.i386.rpm d7fc1e03db312bccd31215b647b86e25
knewsticker-3.0.3-3.2.i386.rpm 461b07e357650696f18a8b4f765c7882
knode-3.0.3-3.2.i386.rpm 3a513107098e7352a7739468c46aa3aa
kooka-3.0.3-5.i386.rpm 8a5598ce40edd6659d7894126847c50d
korn-3.0.3-3.2.i386.rpm 9cc380ecfbd57870450474d3d24a6a68
kpaint-3.0.3-5.i386.rpm dacfc37a044a4a8f7ab641112d1e73d2
kpf-3.0.3-3.2.i386.rpm 77e766459f3f5fe35433591ef940a3fc
kppp-3.0.3-3.2.i386.rpm 7107a712a1fb3fbdc421905db2278c72
kruler-3.0.3-5.i386.rpm 0cdd8d4aca4ef9073d20cbf8aba1a0d4
ksirc-3.0.3-3.2.i386.rpm ea39efb6deee4db448ad0967cd0a35c2
ksnapshot-3.0.3-5.i386.rpm 0ded9db8efba14db92c46cc389fc35fe
ktalkd-3.0.3-3.2.i386.rpm 3d5914e0e082ed8f8a1308a1df9cd834
kuickshow-3.0.3-5.i386.rpm 4ebb9ccd7db8a147f09754972fe9c4f7
kview-3.0.3-5.i386.rpm 689c7ec6268931fdc2d578a9bc93b06a
kviewshell-3.0.3-5.i386.rpm 738ab6d68860a7c276e0557c137cc1e4
kviewshell-devel-3.0.3-5.i386.rpm 81aa7b525199ec9aee14d709193804fd
kxmlrpcd-3.0.3-3.2.i386.rpm 069eaeab2380daf632f605321ebe9938
libkscan-3.0.3-5.i386.rpm 3a362ce3349312972cbb16248df1df37
libkscan-devel-3.0.3-5.i386.rpm 1cb0fad25b6f82fec9cd95f285c10980
lisa-3.0.3-3.2.i386.rpm 526dccfd590c76ff657dcf981cf4a44c
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.
Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
Bugs fixed: (see bugzilla for more information)
73412 - KDE screensaver just blanks screen
74071 - Better way to handle desktop file renames
75085 - Banner of Taiwan
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0838
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0970
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1151
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1152
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1223
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1224
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1247
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1281
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1282
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1306
http://marc.theaimsgroup.com/?l=bugtraq&m=102977530005148
http://www.kde.org/info/security/advisory-20020908-1.txt
http://www.kde.org/info/security/advisory-20020908-2.txt
http://www.kde.org/info/security/advisory-20021008-1.txt
http://www.kde.org/info/security/advisory-20021008-2.txt
http://www.kde.org/info/security/advisory-20021111-1.txt
http://www.kde.org/info/security/advisory-20021111-2.txt
Keywords:
flaw:buf, flaw:css, flaw:design, flaw:infoleak, flaw:spoof
--------------------------------------------------------------------------------
The listed packages are GPG signed by Red Hat, Inc. for security. Our key is
available at:
http://www.redhat.com/solutions/security/news/publickey.html#key
You can verify each package and see who signed it with the following command:
rpm --checksig -v filename
If you only wish to verify that each package has not been corrupted or tampered
with, examine only the md5sum with the following command: rpm --checksig
--nogpg -v filename
Note that you need RPM >= 3.0 to check GnuPG keys.
[***** End Red Hat Security Advisory RHSA-2002:220-40 *****]
_______________________________________________________________________________
CIAC wishes to acknowledge the contributions of Red Hat, Inc. for the
information contained in this bulletin.
_______________________________________________________________________________
CIAC, the Computer Incident Advisory Capability, is the computer
security incident response team for the U.S. Department of Energy
(DOE) and the emergency backup response team for the National
Institutes of Health (NIH). CIAC is located at the Lawrence Livermore
National Laboratory in Livermore, California. CIAC is also a founding
member of FIRST, the Forum of Incident Response and Security Teams, a
global organization established to foster cooperation and coordination
among computer security teams worldwide.
CIAC services are available to DOE, DOE contractors, and the NIH. CIAC
can be contacted at:
Voice: +1 925-422-8193 (7x24)
FAX: +1 925-423-8002
STU-III: +1 925-423-2604
E-mail: ciac@ciac.org
Previous CIAC notices, anti-virus software, and other information are
available from the CIAC Computer Security Archive.
World Wide Web: http://www.ciac.org/
Anonymous FTP: ftp.ciac.org
PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum of
Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained via WWW at http://www.first.org/.
This document was prepared as an account of work sponsored by an
agency of the United States Government. Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, express or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, apparatus, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark, manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government or the University of California, and shall not be used for
advertising or product endorsement purposes.
LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC)
N-010: Web-Based Enterprise Management on Solaris 8 Installs Insecure Files
N-011: Cumulative Patch for Internet Information Service
N-012: Windows 2000 Default Permissions Could Allow Trojan Horse Program
N-013: ISC Remote Vulnerabilities in BIND4 and BIND8
N-014: Trojan Horse tcpdump and libpcap Distributions
N-015: SGI IRIX lpd Daemon Vulnerabilities via sendmail and dns
N-016: Buffer Overrun in Microsoft Data Access Components (MDAC)
N-017: Cisco PIX Multiple Vulnerabilities
N-018: Microsoft Cumulative Patch for Internet Explorer
N-019: Samba Encrypted Password Buffer Overrun Vulnerability
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH