How to Buy
This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated kdelibs packages that fix telnet URI handler and mailto URI
handler file vulnerabilities are now available.
The kdelibs packages include libraries for the K Desktop Environment.
KDE Libraries include: kdecore (KDE core library), kdeui (user
interface), kfm (file manager), khtmlw (HTML widget), kio
(Input/Output, networking), kspell (spelling checker), jscript
Konqueror is a file manager and Web browser for the K Desktop
iDEFENSE identified a vulnerability in the Opera web browser that
could allow remote attackers to create or truncate arbitrary files.
The KDE team has found two similar vulnerabilities that also exist in
A flaw in the telnet URI handler may allow options to be passed to the
telnet program, resulting in creation or replacement of files. An
attacker could create a carefully crafted link such that when opened
by a victim it creates or overwrites a file with the victim's
A flaw in the mailto URI handler may allow options to be passed to the
kmail program. These options could cause kmail to write to the file
system or to run on a remote X display. An attacker could create a
carefully crafted link in such a way that access may be obtained to
run arbitrary code as the victim.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2004-0411 to these issues.
Note: Red Hat Enterprise Linux 2.1 is only vulnerable to the mailto
URI flaw as a previous update shipped without a telnet.protocol file.
All users of KDE are advised to upgrade to these erratum packages,
which contain a backported patch for these issues.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5
Family: Red Hat Local Security Checks
Nessus Plugin ID: 12499 ()
CVE ID: CVE-2004-0411
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.